[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fN42a_ZLFldsW10GcVh8KTRTSYxGGz2NUNfdsaDwgqO0":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20,"patch_diff_files":21,"patch_trac_url":8,"poc_status":8,"poc_video_id":8,"poc_summary":8,"poc_steps":8,"poc_tested_at":8,"poc_wp_version":8,"poc_php_version":8,"poc_playwright_script":8,"poc_vulnerable_code":8,"poc_fix_diff":8,"poc_exploit_code":8,"poc_has_trace":22},"WF-59bf14a9-5abe-4b83-9364-d318eedaba83-vmagazine-lite","accesspress-themes-and-plugin-various-versions-cross-site-request-forgery-15","AccessPress Themes and Plugin \u003C= Various Versions - Cross-Site Request Forgery","A WordPress plugin and several WordPress themes developed by AccessPress Themes are vulnerable to cross-site request forgery via the plugin_activation_callback and plugin_deactivate_callback functions, called via AJAX actions, that were missing capability checks and nonce validation. This makes it possible for unauthenticated attackers to deactivate and activate arbitrary plugins, granted they could trick a site administrator into performing an action such as clicking a link. This could be used to deactivate security plugins and exploit other potential vulnerabilities.",null,"vmagazine-lite","\u003C=1.3.5","1.3.6","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)","2022-01-11 00:00:00","2024-03-19 15:56:18",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F59bf14a9-5abe-4b83-9364-d318eedaba83?source=api-prod",799,[],false]