[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fxAcdSj0eBy75G_dPjLmTX1xyThwLqinYmm4ksiSn2x8":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2020-11548","search-meter-remote-code-execution","Search Meter \u003C= 2.13.2 - Remote Code Execution","The Search Meter plugin through 2.13.2 for WordPress allows user input introduced in the search bar to be any formula. The attacker could achieve remote code execution via CSV injection if a wp-admin\u002Findex.php?page=search-meter Export is performed.","search-meter",null,"\u003C2.13.3","2.13.3","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Control of Generation of Code ('Code Injection')","2020-03-11 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8a1d90f6-40fc-40b5-a46c-9ba9ac2fc1b5?source=api-prod",1413]