[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fT686EZy3ldqWgNrK9_ILfs6KEnj73wyhIVq8GNvSqhI":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-53b5a052-6e84-4eb5-a7f4-4e32f757f4d6-wp-smushit","smush-lazy-load-images-optimize-compress-images-cross-site-scripting","Smush – Lazy Load Images, Optimize & Compress Images \u003C= 2.9.1 - Cross-Site Scripting","The Smush – Lazy Load Images, Optimize & Compress Images plugin for WordPress is vulnerable to Cross-Site Scripting leading  in versions up to, and including, 2.9.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject malicious web scripts into the application.","wp-smushit",null,"\u003C=2.9.1","3.0.0","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2018-12-10 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F53b5a052-6e84-4eb5-a7f4-4e32f757f4d6?source=api-prod",1870]