[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fGvFAetGAtdQdtmZzFl6xvr5xN649JJWnMFaem9hIepY":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-2093","wp-duplicate-page-authenticated-admin-stored-cross-site-scripting","WP Duplicate Page \u003C= 1.2 - Authenticated (Admin+) Stored Cross Site Scripting","The WP Duplicate Page WordPress plugin before 1.3 does not sanitize and escape some of its settings, which could allow high privilege users such as admin to perform Cross-Site Scripting attacks even when unfiltered_html is disallowed.","wp-duplicate-page",null,"\u003C1.3","1.3","medium",5.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","2022-06-20 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F52944aa6-a6ee-46ce-bd0c-18c69fe1ada7?source=api-prod",582]