[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fVrMhih-__nSpj0B1WkUJ1x4PDARfUYvy9SwsP7X4YH4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-50885","store-locator-wordpress-authenticatedadministrator-directory-traversal-to-arbitrary-file-deletion","Store Locator WordPress \u003C= 1.4.14 - Authenticated(Administrator+) Directory Traversal to Arbitrary File Deletion","The Store Locator WordPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.4.14. This makes it possible for authenticated attackers, with administrator access and above, to delete arbitrary files.","agile-store-locator",null,"\u003C=1.4.14","1.4.15","medium",6.6,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:H\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')","2023-12-26 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8cb5c386-eee3-4e88-a827-766a4901f432?source=api-prod",28]