[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f43wXtpY4QN8y7vgT8S_5KuUD9ULbZckQjC8Hdn6cDzo":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-e91e6101-bd30-4cf1-9a39-23218c3bff6f-newsletter","newsletter-csv-injection","Newsletter \u003C= 6.5.3 - CSV Injection","The Newsletter plugin for WordPress is vulnerable to CSV Injection in versions up to, and including, 6.5.3 by the use of Microsoft Excel DDE function, or to leak data via maliciously injected hyperlinks. This allows non-privileged attackers to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration.","newsletter",null,"\u003C=6.5.3","6.5.4","medium",5.5,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:L\u002FUI:R\u002FS:C\u002FC:L\u002FI:L\u002FA:L","Improper Input Validation","2020-03-16 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe91e6101-bd30-4cf1-9a39-23218c3bff6f?source=api-prod",1408]