[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f8Af2S6wZ-WcXpD6ZDMDcwhg_6GZ8iRsu48dfwqBspVA":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-fdfb5e74-e52c-4f44-acdc-9740624af9e7-simple-file-list","simple-file-list-arbitrary-file-deletion-2","Simple File List \u003C= 3.2.4 - Arbitrary File Deletion","The Simple File List plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to, and including, 3.2.4. This is due to the upward path traversal via the 'eeDeleteFile' parameter. This makes it possible for unauthenticated attackers to delete files within the vulnerable service.","simple-file-list",null,"\u003C=3.2.4","3.2.5","high",8.6,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:N\u002FI:H\u002FA:N","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2019-05-23 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ffdfb5e74-e52c-4f44-acdc-9740624af9e7?source=api-prod",1706]