[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fK54OHMcn5-5Zzuj4Wyo2_JmI3i9lflaWJLlK5Z8gJTM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-45293","phpspreadsheet-library-xxe-injection","PHPSpreadsheet Library \u003C 2.3.0 - XXE Injection","The security scanner that prevents XXE attacks in the XLSX reader can be bypassed by slightly modifying the XML structure, utilizing white spaces. On servers that allow users to upload their own Excel (XLSX) sheets, Server files, and sensitive information can be disclosed by providing a crafted sheet.","users-import-export-with-excel-for-wp",null,"\u003C=1.5","1.6","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Restriction of XML External Entity Reference","2024-10-07 00:00:00","2025-04-07 18:19:55",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F38f950b7-e3a0-4e05-a8b0-9cc6b6c66b0c?source=api-prod",183]