[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fQ5of2x7UZ2-6oNATnhHr0ii53_qIClD4GQ2bT_F7Sz0":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-30509","sellkit-authenticated-subscriber-arbitrary-file-download","SellKit \u003C= 1.8.1 - Authenticated (Subscriber+) Arbitrary File Download","The SellKit – Funnel builder and checkout optimizer for WooCommerce to sell more, faster plugin for WordPress is vulnerable to arbitrary file downloads in all versions up to, and including, 1.8.1. This is due to insufficient file validation in the handle_file_download function. This makes it possible for authenticated attackers, with subscriber-level access and above, to download arbitrary files.","sellkit",null,"\u003C=1.8.1","1.8.3","medium",6.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2024-03-28 00:00:00","2024-04-03 14:42:57",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F21bc2595-0760-42a6-b11b-3f7609223d8b?source=api-prod",7]