[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f42szlqxucRFBiDGFEnS0N2Ntj76AUq_8QAWCB2b10eM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-5360","royal-elementor-addons-and-templates-unauthenticated-arbitrary-file-upload","Royal Elementor Addons and Templates \u003C= 1.3.78 - Unauthenticated Arbitrary File Upload","The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.3.78. This is due to insufficient file type validation in the handle_file_upload() function called via AJAX which allows attackers to supply a preferred filetype extension to the 'allowed_file_types' parameter, with a special character, which makes it possible for the uploaded file to bypass their filter list. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.","royal-elementor-addons",null,"\u003C=1.3.78","1.3.79","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Unrestricted Upload of File with Dangerous Type","2023-10-09 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fa9d95af5-96da-4259-98c6-e2c4c574a896?source=api-prod",106]