[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fnlDdIsIZUw0o_w8A9qmlwnxEu4pKtYMZK5OqPE-6wxM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-6042","getwid-gutenberg-blocks-improper-input-validation-to-arbitrary-email-sending-to-admin","Getwid – Gutenberg Blocks \u003C= 2.0.2 - Improper Input Validation to Arbitrary Email Sending to Admin","The Getwid – Gutenberg Blocks plugin for WordPress is vulnerable to unauthorized arbitrary email sending due to insufficient limitations on the content of emails sent in all versions up to, and including, 2.0.2. This makes it possible for unauthenticated attackers to send emails to the site admin with arbitrary content from the site.","getwid",null,"\u003C=2.0.2","2.0.3","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Improper Input Validation","2023-12-15 00:00:00","2024-02-06 16:39:45",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1158081c-97da-4026-be16-994f4e41c92f?source=api-prod",54]