[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f4-NtKoejlKU4KhiYXvurFa84uTmIIruWBcZIC0zAJdw":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-d5d23fdc-081a-4228-897f-2470a9327887-woocommerce-ajax-filters","woocommerce-ajax-product-filters-arbitrary-settings-update","WooCommerce AJAX Product Filters \u003C= 1.3.6 - Arbitrary Settings Update","The WooCommerce AJAX Product Filters plugin for WordPress is vulnerable to Arbitrary Settings Update in versions up to, and including, 1.3.6. This is due to incorrect usage of the admin_init hook. This makes it possible for unauthenticated attackers to change any of the plugin settings and redirect users to malicious URLs.","woocommerce-ajax-filters",null,"\u003C1.3.7","1.3.7","high",8.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:L","Improper Privilege Management","2019-09-18 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fd5d23fdc-081a-4228-897f-2470a9327887?source=api-prod",1588]