[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$feMHKxFiTtepOIG5ad46JGaBBMMAJOMTnqnKNFZOc-9M":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-379a5016-3968-4b28-8d6e-0f517e419016-eid-easy-qualified-electonic-signature","various-plugins-various-version-use-of-polyfillio-4","Various Plugins \u003C= Various Version - Use of Polyfill.io","Multiple plugins for WordPress are vulnerable to malicious redirection in various versions. This is due to the use of Polyfill.io. Polyfill.io is a JavaScript library used to streamline delivery of content across older browsers and was taken over by malicious threat actors that used the service to redirect victims to malicious websites. While many WordPress plugins utilize Polyfill.io, not all of them may have been delivering malicious content. Regardless, it is recommended to update to a version of the plugin where Polyfill is no longer used or manually remove the use of Polyfill.io from the plugin.","eid-easy-qualified-electonic-signature",null,"\u003C=3.3.0","3.3.1","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Use of Less Trusted Source","2024-06-25 00:00:00","2024-07-08 20:45:38",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F379a5016-3968-4b28-8d6e-0f517e419016?source=api-prod",14]