[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fGd_Q3h_z0YE0O5b6U0Ht4wu5dxTw-RQStWiq-wOUT6w":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-45829","easy-wp-smtp-authenticated-admin-arbitrary-file-deletion","Easy WP SMTP \u003C= 1.5.1 - Authenticated (Admin+) Arbitrary File Deletion","The Easy WP SMTP plugin for WordPress is vulnerable to Arbitrary File Deletion versions up to, and including, 1.5.1. This is possibly due to the SMTP import\u002Fexport functionality. This makes it possible for administrator-level attackers to arbitrarily delete files on the server, including critical files for the website's functionality.","easy-wp-smtp",null,"\u003C=1.5.1","1.5.2","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:H","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2022-11-30 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F748220a6-9882-458c-8f80-a928f449c400?source=api-prod",419]