[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f8myJHj_Uw4ep-j3w1r8eSJ579wbvZ1_FfxBGlY2nHoM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-0b4a0dff-1054-4f50-8ff5-e3cc2b45d77b-image-optimizer-wd","image-optimizer-by-10web-directory-traversal-to-information-exposure","Image Optimizer by 10web \u003C= 1.0.25 - Directory Traversal to Information Exposure","The Image Optimizer by 10web plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 1.0.25 via the dir parameter in the get_subdirs AJAX function. This allows authenticated attackers with subscriber-level permissions or above to view the directory structure of arbitrary folders on the server, though it does not reveal or provide access to any files.","image-optimizer-wd",null,"\u003C1.0.26","1.0.26","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2023-04-19 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0b4a0dff-1054-4f50-8ff5-e3cc2b45d77b?source=api-prod",279]