[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fRFF0btirHITk4hicdcewzHtHDCxbPjIohvrq5YORf94":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-4693","user-verification-privilege-escalation","User Verification \u003C= 1.0.93 - Privilege Escalation","The User Verification plugin for WordPress is vulnerable to authentication bypass. This is due to the fact that when generating OTP codes for users to use in order to login, the plugin returns these codes in an AJAX response. This makes it possible for unauthenticated attackers to obtain login codes for administrators.","user-verification",null,"\u003C=1.0.93","1.0.94","critical",9.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Authentication","2022-12-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc7e3a8ee-9950-4da4-8450-8b5902b3b876?source=api-prod",391]