[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhaaaSbaoKccS9NnZyn1oIjDMg5OLkkFqU0yPy8A1Loo":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-02b61eb1-a93f-4437-87de-d698af8ef9f6-blog2social","blog2social-php-object-injection","Blog2Social \u003C= 6.9.3 - PHP Object Injection","The Blog2Social plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including 6.9.3 due to the use of unserialize on user supplied input retrieved from the 'b2s-post-meta-box-best-time-settings' and 'assignList' parameters.","blog2social",null,"\u003C=6.9.3","6.9.4","high",8.5,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:L\u002FUI:N\u002FS:C\u002FC:H\u002FI:H\u002FA:H","Deserialization of Untrusted Data","2022-04-05 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F02b61eb1-a93f-4437-87de-d698af8ef9f6?source=api-prod",658]