[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fmpQ_qDl8MQt6soJ9ydEd_g17BOadWMcu68KBbreDZG4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-47873","wp-child-theme-generator-authenticated-administrator-arbitrary-file-upload","WP Child Theme Generator \u003C= 1.1.2 - Authenticated (Administrator+) Arbitrary File Upload","The WP Child Theme Generator plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.1.2 due to insufficient file type checking in the wctg_custom_child_theme_process() function. This makes it possible for administrators to upload arbitrary files on the affected site's server which may make remote code execution possible.","wp-child-theme-generator",null,"\u003C=1.1.2","1.1.3","critical",9.1,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:H\u002FI:H\u002FA:H","Unrestricted Upload of File with Dangerous Type","2023-11-20 00:00:00","2024-09-13 13:22:18",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F49fcd2cb-d880-4152-a736-33fd90f07083?source=api-prod",299]