[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fTAgTQqJmgPaTtHLyw8X8DnRvkqbaWNnEXdiq8XxqH8U":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-25912","simple-git-remote-code-execution-2","simple-git \u003C 3.15.0 - Remote Code Execution","The package simple-git is vulnerable to Remote Code Execution in versions before 3.15.0 when the ext transport protocol is enabled. This makes the vulnerability exploitable using the clone method. WordPress plugins and themes may be using this package, however, may not be vulnerable to exploitation.","autoshare-for-twitter",null,"\u003C=1.2.1","1.3.0","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Control of Generation of Code ('Code Injection')","2022-12-05 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F4c747e6f-31fc-41b0-ba62-f009b5483696?source=api-prod",414]