[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fYGC5LEeLNoxcp-QS9PdVxZYBx4IjjjzCRcwmnUoIdWE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-1580","site-offline-maintenance-mode-bypass","Site Offline \u003C= 1.4.9 - Maintenance Mode Bypass","The Site Offline plugin for WordPress is vulnerable to Maintenance Mode Bypass in versions up to, and including, 1.4.9. The presence of certain keywords in the URL allowed users to visit a site placed in maintenance mode thus bypassing the plugin's provided feature.","site-offline",null,"\u003C=1.4.9","1.5.3","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Improper Access Control","2022-08-29 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fac06b9d9-51de-4f7a-87b8-c7b46a8475ee?source=api-prod",512]