[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f6B717y45lnA33quNWhgJBJ8OlQYRf_JlnUIdHAY30h8":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-4752b3a7-dbb0-4326-bfff-b94dd55b4bf1-dc-woocommerce-multi-vendor","multivendor-marketplace-solution-for-woocommerce-wc-marketplace-local-file-inclusion","Multivendor Marketplace Solution for WooCommerce – WC Marketplace \u003C= 3.8.11.8 - Local File Inclusion","The Multivendor Marketplace Solution for WooCommerce plugin is vulnerable to Local File Inclusion via the 'wcmp_announcements_refresh_tab_data' unprotected AJAX action in versions up to, and including, 3.8.11.8. This allows unauthenticated attackers to include arbitrary files on the local filesystem, potentially granting access to sensitive information or restricted areas.","dc-woocommerce-multi-vendor",null,"\u003C=3.8.11.8","3.8.12","high",8.2,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:L\u002FA:N","Improper Control of Filename for Include\u002FRequire Statement in PHP Program ('PHP Remote File Inclusion')","2022-08-15 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4752b3a7-dbb0-4326-bfff-b94dd55b4bf1?source=api-prod",526]