[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fgjnHmowKYEvz3LkcZgtsCpQs4RtQILCrPUAjYtAYkEc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-a2363a40-b627-44da-af8e-98821685c3ea-eshop-magic","eshop-magic-arbitrary-file-read","Eshop Magic \u003C 0.2 - Arbitrary File Read","The Eshop Magic plugin for WordPress is vulnerable to Arbitrary File Disclosure in versions before 0.2 via the 'file' parameter. This allows unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information.","eshop-magic",null,"\u003C0.2","0.2","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2012-10-12 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa2363a40-b627-44da-af8e-98821685c3ea?source=api-prod",4120]