[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fwxER0Xm7JAwG9XodJzMxixdS8eiVj9xOZ0sfa_aRhPk":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-44227","simple-file-list-unauthenticated-arbitrary-file-deletion","Simple File List \u003C= 6.1.9 - Unauthenticated Arbitrary File Deletion","The Simple File List plugin for WordPress is vulnerable to arbitrary file deletion in versions up to, and including, 6.1.9. This is due to insufficient controls on files passed to a deletion function. This makes it possible for unauthenticated attackers to delete arbitrary files, which can lead to a denial of service or remote code execution when the wp-config.php file is deleted.","simple-file-list",null,"\u003C=6.1.9","6.1.10","critical",9.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:H","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2023-09-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F7eada9b7-8d53-4e95-858e-aa706f74b2a1?source=api-prod",117]