[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f3zukkx0uecHIQWsQwP3cw1MA0dn2Q0qvVgRXBKGRF_w":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-45053","wp-content-pilot-autoblogging-affiliate-marketing-plugin-authenticated-contributor-content-injection","WP Content Pilot – Autoblogging & Affiliate Marketing Plugin \u003C= 1.3.3 - Authenticated (Contributor+) Content Injection","The WP Content Pilot plugin for WordPress is vulnerable to Arbitrary Content Injection in versions up to, and including, 1.3.3. This vulnerability makes it possible for authenticated attackers, with contributor access or higher to inject new content onto the website, possibly through the manipulation of posts to create new web pages, spam, or phishing.","wp-content-pilot",null,"\u003C=1.3.3","1.3.4","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')","2023-10-03 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F373c10df-0d9c-4f76-8d1f-cad6bcfed141?source=api-prod",112]