[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fa9pVo4v-M2CcIxzMXz0lnTiADtsCwQsuvHQV9UMOJ7U":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-3912","user-registration-authenticated-subscriber-arbitrary-file-upload-2","User Registration \u003C= 2.2.4  - Authenticated (Subscriber+) Arbitrary File Upload","The User Registration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation via the profile_pic_upload function in versions up to, and including, 2.2.4. This makes it possible for authenticated attackers, with subscriber access or higher, to upload arbitrary files on the affected sites server which may make remote code execution possible.","user-registration",null,"\u003C=2.2.4","2.2.41","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Unrestricted Upload of File with Dangerous Type","2022-11-21 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc07ea205-5a05-43f5-993e-c6e30f660ac8?source=api-prod",428]