[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fH5NQznNTysER1mt9pHk4FWh-0WAASGJmzPWgDGLft5U":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-4496","saml-single-sign-on-sso-login-premium-multisite-open-redirect","SAML Single Sign On – SSO Login Premium Multisite \u003C 20.0.7 - Open Redirect","The SSO Login Premium Multisite plugin for WordPress is vulnerable to Open Redirect in versions up to, and including, 20.0.7 due to missing validation of its redirect parameter. This makes it possible for an attacker to redirect authenticated users.  This vulnerability also affects the Premium Edition (versions \u003C12.1.0) and Standard Edition (versions \u003C16.0.8) of the plugin.","miniorange-saml-20-single-sign-on",null,">=20 \u003C20.0.7","20.0.7","medium",6.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:C\u002FC:N\u002FI:L\u002FA:L","URL Redirection to Untrusted Site ('Open Redirect')","2023-01-06 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1adcc627-c371-452b-95b7-25c659117116?source=api-prod",382]