[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fhLhA_C4ETe3h0ldP5gqdtdyphuit-QEr9aESRtqg3-s":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-8479","simple-spoiler-unauthenticated-arbitrary-shortcode-execution","Simple Spoiler 1.2 - 1.3 - Unauthenticated Arbitrary Shortcode Execution","The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.","simple-spoiler",null,">=1.2 \u003C=1.3","1.4","high",7.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:L","Improper Control of Generation of Code ('Code Injection')","2024-09-13 00:00:00","2024-09-14 03:29:29",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8ffc76d8-b841-4c26-bbc6-1f96664efe36?source=api-prod",1]