[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fak2g4Ek55SKXX2UKeKbaj2W0LRNTHpIi10Xo3rlLYV4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2021-24936","wp-extra-file-types-cross-site-request-forgery-to-stored-cross-site-scripting","WP Extra File Types \u003C= 0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting","The WP Extra File Types WordPress plugin before 0.5.1 does not have CSRF check when saving its settings, nor sanitise and escape some of them, which could allow attackers to make a logged in admin change them and perform Cross-Site Scripting attacks","wp-extra-file-types",null,"\u003C=0.5","0.5.1","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:R\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Cross-Site Request Forgery (CSRF)","2021-12-27 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fae397949-12d2-4323-871e-4fd4f14f35c6?source=api-prod",757]