[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f15f8W8apHvcHG52DOrBzJ_2WnpQMYeyFq4T4Kbu1FOo":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-35736","visualizer-authenticated-subscriber-sql-injection","Visualizer \u003C= 3.11.1 - Authenticated (Subscriber+) SQL Injection","The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to SQL Injection via the saveQuery function() in all versions up to, and including, 3.11.1 due to a missing capability check on a function that runs SQL Queries.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.","visualizer",null,"\u003C=3.11.1","3.11.2","critical",9.9,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:C\u002FC:H\u002FI:H\u002FA:H","Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","2024-06-06 00:00:00","2024-06-13 19:07:28",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc1528125-9d26-40a2-9591-4220c18cef37?source=api-prod",8]