[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fTpHvPGNUDgzztUqSqsUVc50c-fCL_YaAuW1SPcFJdwU":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-33327","leyka-privilege-escalation-via-admin-password-reset","Leyka \u003C= 3.30.2 - Privilege Escalation via Admin Password Reset","The Leyka plugin for WordPress is vulnerable to Privilege Escalation in versions up to, and including, 3.30.2. This allows donors users to gain administrator access by setting the passwords for an administrator account when initially setting their password.","leyka",null,"\u003C=3.30.2","3.30.3","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Authorization Bypass Through User-Controlled Key","2023-05-22 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0152bcc9-6d24-4475-848d-71fe88aa7e2a?source=api-prod",246]