[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fwhnZ-mO-VmF97L62Ie2T9_LC8-kKuJO0eZNQUY6PJ9o":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-f28ca2dc-404d-4abf-9d44-1b1f8309e9ee-post-grid","post-grid-arbitrary-file-deletion","Post Grid \u003C= 2.0.12 - Arbitrary File Deletion","The Post Grid plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 2.0.12. This is due to the plugin failing to properly verify user input. This makes it possible for unauthenticated attackers to delete files on the vulnerable service.","post-grid",null,"\u003C=2.0.12","2.0.13","critical",9.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:H","External Control of File Name or Path","2016-11-08 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff28ca2dc-404d-4abf-9d44-1b1f8309e9ee?source=api-prod",2632]