[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f0v_et7so686ibYkF8wfLgjzB4E23AXsXzifEsb1csNQ":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-b19ce745-2cc4-48eb-b5f3-5011be7cceec-w3-total-cache","w3-total-cache-server-side-request-forgery","W3 Total Cache \u003C= 0.9.7.3 - Server Side Request Forgery","The W3 Total Cache plugin for WordPress is vulnerable to Server Side Request Forgery in versions up to, and including 0.9.7.3, due to insufficient user input validation in the opcache_flush_file file.","w3-total-cache",null,"\u003C=0.9.7.3","0.9.7.4","medium",5.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:N","Server-Side Request Forgery (SSRF)","2019-05-22 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fb19ce745-2cc4-48eb-b5f3-5011be7cceec?source=api-prod",1707]