[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f9_kgnxEDzhG7Ai39k4_2D990KjXJT0bq-G8d9ehUmac":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-8e0e6fdd-49d2-404a-83e8-c4884bbe7088-newsletters-lite","newsletters-directory-traversal-2","Newsletters \u003C= 4.6.4.2 - Directory Traversal","The Newsletters plugin for WordPress is vulnerable to directory traversal due to insufficient validation on the data supplied via the 'file' parameter in versions up to, and including 4.6.4.2. This makes it possible for authenticated attackers to access arbitrary files on the system.","newsletters-lite",null,"\u003C=4.6.4.2","4.6.4.3","medium",4.9,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2017-05-29 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8e0e6fdd-49d2-404a-83e8-c4884bbe7088?source=api-prod",2430]