[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fRXwBREJbJF_JbeBQikLE9ifKnmYS3184ETy3Fzlg6AQ":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-39596","quentn-wp-unauthenticated-privilege-escalation","Quentn WP \u003C= 1.2.8 - Unauthenticated Privilege Escalation","The Quentn WP plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.2.8. This makes it possible for unauthenticated attackers to elevate their privileges to that of an administrator.","quentn-wp",null,"\u003C=1.2.8","1.2.9","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Privilege Management","2025-04-17 00:00:00","2025-04-22 19:27:01",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fe4bede17-d174-42d0-a25e-bf7fe10e4206?source=api-prod",6]