[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fzCxoRoh-nAORioPWazpmkUlUUEPVAXYbYl-Y6O3J8qk":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-5dde4850-347f-40e6-9cea-87284aa655e7-wpvivid-backuprestore","migration-backup-staging-wpvivid-authenticated-admin-directory-traversal","Migration, Backup, Staging – WPvivid \u003C= 0.9.75 - Authenticated (Admin+) Directory Traversal","The WPvivid plugin for WordPress is vulnerable to directory traversal in versions up to, and including, 0.9.75. This allows authenticated users with administrative privileges to download arbitrary files on the server, including sensitive configuration files, though the file size must be successfully guessed in order to do so.","wpvivid-backuprestore",null,"\u003C=0.9.75","0.9.76","medium",6,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:L\u002FA:L","Relative Path Traversal","2022-08-16 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5dde4850-347f-40e6-9cea-87284aa655e7?source=api-prod",525]