[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fbwT9iacjrLvM2M22nYMp6YThys-jbCI_445D3P1yr38":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-69ec31f3-8ec8-40ad-ba7f-77f9132ad51f-iubenda-cookie-law-solution","iubenda-all-in-one-compliance-for-gdpr-ccpa-cookie-consent-more-server-side-request-forgery","iubenda | All-in-one Compliance for GDPR \u002F CCPA Cookie Consent + more \u003C= 3.0.8 - Server-Side Request Forgery","The iubenda | All-in-one Compliance for GDPR \u002F CCPA Cookie Consent + more plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including 3.0.8. This makes it possible for attackers to send requests on behalf of the server and can lead to information disclosure in certain hosting environments.","iubenda-cookie-law-solution",null,"\u003C=3.0.7","3.0.8","high",8.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:L","Server-Side Request Forgery (SSRF)","2022-06-17 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F69ec31f3-8ec8-40ad-ba7f-77f9132ad51f?source=api-prod",585]