[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fROvumOhfzSvBqbAkfDRHUbh3w4Pyt3UNpAvPbY3QM-Y":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-32830","buddyforms-unauthenticated-arbitrary-file-read-and-server-side-request-forgery","BuddyForms \u003C= 2.8.8 - Unauthenticated Arbitrary File Read and Server-Side Request Forgery","The Post Form – Registration Form – Profile Form for User Profiles – Frontend Content Forms for User Submissions (UGC) plugin for WordPress is vulnerable to Arbitrary File Read and Server-Side Request Forgery in all versions up to, and including, 2.8.8. This makes it possible for unauthenticated attackers to read arbitrary files on the server and make requests to internal services.","buddyforms",null,"\u003C=2.8.8","2.8.9","critical",9.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:H\u002FI:L\u002FA:N","Server-Side Request Forgery (SSRF)","2024-04-22 00:00:00","2024-04-29 13:53:27",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F23d762e9-d43f-4520-a6f1-c920417a2436?source=api-prod",8]