[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fzkHmInQJraIUNlZZl1h_ZPuffM4CiCcJ0dIni2y3mBw":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-46195","headline-analyzer-missing-authorization-via-rest-apis","Headline Analyzer \u003C= 1.3.1 - Missing Authorization via REST APIs","The Headline Analyzer plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions called via REST API endpoints in versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to retrieve and update headline post data as well as disconnect and connect an account for the plugin.","headline-analyzer",null,"\u003C=1.3.1","1.3.2","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:N","Missing Authorization","2023-10-18 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa057ad05-0ed7-48c4-9dc1-0e7b1d3cb270?source=api-prod",97]