[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fS4uM-HY-U2B-rY2ret1fyak_liv1RIPZI9cryPAf5Bs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2021-39343","mpl-publisher-authenticated-admin-stored-cross-site-scripting","MPL-Publisher  \u003C= 1.30.2 - Authenticated (Admin+) Stored Cross-Site Scripting","The MPL-Publisher WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and sanitization via several parameters found in the ~\u002Flibs\u002FPublisherController.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 1.30.2. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.","mpl-publisher",null,"\u003C=1.30.2","1.30.3","medium",5.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2021-10-15 19:23:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff8d093ae-e0b1-49c2-a492-e01f2e954ddb?source=api-prod",829]