[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f5QEM8xuY8w0qz-8qrXJdVBiYzV8HD1uje-FQFHboHAI":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-38388","jupiterx-core-unauthenticated-arbitrary-file-upload","JupiterX Core \u003C= 3.3.5 - Unauthenticated Arbitrary File Upload","The JupiterX Core plugin for WordPress is vulnerable to arbitrary file uploads in versions up to, and including, 3.3.5 due to missing file type validation on the upload_files() function. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. This affects both free and premium versions of the plugin.","jupiterx-core",null,"\u003C=3.3.5","3.3.8","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Unrestricted Upload of File with Dangerous Type","2023-08-22 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F980a9237-7dea-4058-a850-b849457b4fef?source=api-prod",154]