[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f_Gol-EcBdXZ4lqVnn1Cs6OYFju3XYhxxpYDt7DxDMTI":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-51687","product-catalog-simple-sensitive-information-exposure-via-product-csv","Product Catalog Simple \u003C= 1.7.6 - Sensitive Information Exposure via Product CSV","The Product Catalog Simple plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to 1.7.7 (exclusive) via Import and Export Product CSV files. This makes it possible for unauthenticated attackers access and above, to extract sensitive data including full product information.","post-type-x",null,"\u003C1.7.7","1.7.7","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2023-12-27 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4f4099b3-6c79-42c2-be41-4ad8d73cc2b8?source=api-prod",27]