[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fzgVMxPIr1js0bHnuu-ZwR_1w_E944Igf6V3GWs7ImiQ":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-37978","http-headers-server-side-request-forgery","HTTP Headers \u003C= 1.18.11 - Server-Side Request Forgery","The HTTP Headers plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.18.11 via the ajax-inspect.php file. This can allow authenticated attackers with admin access to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.","http-headers",null,"\u003C=1.18.11","1.19.0","medium",5.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Server-Side Request Forgery (SSRF)","2023-07-13 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F69971673-e317-452c-8c54-97de006a214f?source=api-prod",194]