[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f3BOeajwE5Zm6956g63qc2gsZcwNKYNxec5BXY6H-sas":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-0218","wp-html-mail-missing-authorization-on-rest-route","WP HTML Mail \u003C= 3.0.9 - Missing Authorization on Rest Route","The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the \u002Fthemesettings REST-API endpoint found in the ~\u002Fincludes\u002Fclass-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.","wp-html-mail",null,"\u003C=3.0.9","3.1","high",8.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:L","Missing Authorization","2022-01-19 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0a42449f-aef1-42b8-af58-4f4aab7008f3?source=api-prod",734]