[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fgPvtwMaT_N16ktexik4LGvCqQDG4ysM31Zx3hjdPMg4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-680746a3-8a72-4ec2-9f58-d744f40168ed-mailchimp-subscribe-sm","mailchimp-subscribe-form-optin-builder-popup-builder-form-builder-remote-code-execution","MailChimp Subscribe Form, Optin Builder, PopUp Builder, Form Builder \u003C 1.2 - Remote Code Execution","The MailChimp Subscribe Form, Optin Builder, PopUp Builder, Form Builder theme for WordPress is vulnerable to Remote Code Execution in versions before 1.2 via the email field. This allows authenticated attackers to execute code on the server.","mailchimp-subscribe-sm",null,"\u003C1.2","1.2","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Control of Generation of Code ('Code Injection')","2015-04-21 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F680746a3-8a72-4ec2-9f58-d744f40168ed?source=api-prod",3199]