[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fk_VZORo5Ht1ZKhEQmVfG2azSVmN2w-S65DwoMCx6FTg":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-bba4f30f-fc21-4387-a29e-4e4a115d7c3c-apocalypse-meow","apocalypse-meow-authentication-bypass","Apocalypse Meow 21.1.3 - 21.2.7 - Authentication Bypass","The Apocalypse Meow plugin for WordPress is vulnerable to Authentication Bypass in versions 21.1.3 - 21.2.7. This is due to improper validation via bcrypt. This makes it possible for unauthenticated attackers to bypass the authentication check.","apocalypse-meow",null,">=21.1.3 \u003C=21.2.7","21.2.8","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Weak Encoding for Password","2017-12-03 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fbba4f30f-fc21-4387-a29e-4e4a115d7c3c?source=api-prod",2242]