[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fPN13akYrfEJyeTEa3_T0PonAsE1AGCpcoJXcuyCAJRY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-d3004699-3285-426a-8a85-33be6c0c0b6f-print-my-blog","print-my-blog-print-pdf-ebook-converter-unprotected-ajax-actions","Print My Blog – Print, PDF, & eBook Converter \u003C= 3.15.8 - Unprotected AJAX Actions","The Print My Blog – Print, PDF, & eBook Converter plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions hooked via AJAX actions in versions up to, and including, 3.15.8. This makes it possible for authenticated attackers with subscriber-level permissions and above to modify the plugin's settings and inject malicious JavaScript. The affected AJAX actions are: wp_ajax_pmb_save_project_main, wp_ajax_pmb_post_search, wp_ajax_pmb_add_print_material, wp_ajax_pmb_reduce_credits, wp_ajax_pmb_report_error, and wp_ajax_pmb_duplicate_print_material. This could also be exploited via Cross-Site Request Forgery.","print-my-blog",null,"\u003C=3.15.8","3.15.9","medium",6.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:L","Missing Authorization","2022-06-20 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fd3004699-3285-426a-8a85-33be6c0c0b6f?source=api-prod",582]