[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fAT10mJKDgvqaf3VOZp3gUnfcr_Jhmp_wRxi3VNON9V4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-b6bff35f-f881-4c60-9611-4a04727bac36-woocommerce-gateway-eway","woocommerce-eway-gateway-insecure-direct-object-reference","WooCommerce Eway Gateway \u003C= 3.5.0 - Insecure Direct Object Reference","The WooCommerce Eway Gateway plugin for WordPress is vulnerable to insecure direct object reference in versions up to, and including, 3.5.0. This is due to insufficient validation on the 'order' user-controlled key. This ensures that subscriptions are paid for by the subscriber as opposed to another user.","woocommerce-gateway-eway",null,"\u003C=3.5.0","3.5.1","medium",5.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:N","Authorization Bypass Through User-Controlled Key","2023-01-04 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fb6bff35f-f881-4c60-9611-4a04727bac36?source=api-prod",384]