[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fuIYJIlWne8mwZ9z5pbhsNMs0KrvFJX1QiLVOpNNvR3o":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-28154","webpack-js-package-sandbox-bypass","webpack JS package \u003C= 5.75.0 - Sandbox Bypass","The JS package webpack is vulnerable to Sandbox Bypass in versions up to, and including, 5.75.0 due to mishandling magic comments. Some WordPress plugins and themes use this dependency, however, are not vulnerable to exploitation.","elasticpress",null,"\u003C=4.5.0","4.5.1","high",8.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:L","Improper Privilege Management","2023-04-11 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F1cda31a4-4c79-4567-a527-6510c31d2843?source=api-prod",287]