[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fuofIUOdwALEJVv_M9GC8CnOCq2wDSkXdkr9fuAtfexY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-36505","ninja-forms-authenticated-admin-arbitrary-file-deletion","Ninja Forms \u003C= 3.6.24 - Authenticated (Admin+) Arbitrary File Deletion","The Ninja Forms plugin for WordPress is vulnerable to arbitrary file deletions in versions up to, and including, 3.6.24. This is due to insufficient restriction on the file path that can be supplied during file deletion. This makes it possible for authenticated attackers, with administrative-level access, to delete arbitrary files on the server. One such file that could be targeted is wp-config.php which if deleted can make it possible for an attacker to connect a site to their own database and ultimately achieve remote code execution on the server.","ninja-forms",null,"\u003C=3.6.24","3.6.25","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:L","External Control of File Name or Path","2023-06-22 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe97479b1-06a0-4e24-9d2b-005bdfec9eaf?source=api-prod",215]