[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$f3FT-PtAkuq5FxGLlw-qp9yx_H2SXYUlskisH46eyysM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-1381","wp-meta-seo-authenticated-author-phar-deserialization","WP Meta SEO \u003C= 4.5.4 - Authenticated (Author+) PHAR Deserialization","The WP Meta SEO plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 4.5.4 due to insufficient file path validation that makes it possible for attackers to supply paths to files with a phar:\u002F\u002F wrapper that will unserialize during retrieval. This makes it possible for authenticated attackers, with author-level permissions and above, to inject a PHP Object. The plugin does contain a useable gadget chain that may make remote execution possible.","wp-meta-seo",null,"\u003C=4.5.4","4.5.5","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Deserialization of Untrusted Data","2023-03-27 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F9f07d76e-1973-4ea7-b448-666466cd688f?source=api-prod",302]