[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4G9GpktZBvwjBewIBsueRRnw8QJ0MEKI1Aw1IObzf6U":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-6897","ean-for-woocommerce-insecure-direct-object-reference-to-sensitve-information-exposure-via-shortcode","EAN for WooCommerce \u003C= 4.9.2 - Insecure Direct Object Reference to Sensitve Information Exposure via Shortcode","The EAN for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.9.2 via the the 'alg_wc_ean_product_meta' shortcode due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with contributor-level access and above, to expose potentially sensitive post metadata.","ean-for-woocommerce",null,"\u003C=4.9.2","4.9.3","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Authorization Bypass Through User-Controlled Key","2024-04-17 00:00:00","2024-07-29 21:35:55",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F17b20df5-4adf-47ce-bddf-2ec0b9499de8?source=api-prod",104]