[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fLhGcHR6UiHUgJ-U-93sEzQ93vAPZ-Ru_8u7e01SeB_A":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-2638","export-all-urls-arbitrary-file-deletion","Export All URLs \u003C= 4.3 - Arbitrary File Deletion","The Export All URLs  for WordPress is vulnerable to arbitrary file deletion in versions up to, and including, 4.3 due to missing file path and type validation in the ~\u002Fextract-all-urls-settings.php file on the 'f' parameter.  This makes it possible for authenticated attackers with administrative privileges to deleted arbitrary files hosted on the server.","export-all-urls",null,"\u003C=4.3","4.4","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:H","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2022-08-08 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F2493a2f8-d4e4-4c42-b748-5632b96b085e?source=api-prod",533]