[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fPU2M5jcUcmrgF8qO_7JFoXcYecMVkk2B5UEcWEHvJ9A":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-634ccd08-4f2e-4a06-8c64-dfe38fa3a481-wp-super-cache","wp-super-cache-php-object-injection","WP Super Cache \u003C= 1.4.4 - PHP Object Injection","The WP Super Cache plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.4.4 via deserialization of untrusted input. This allows attackers to inject a PHP Object into cache files. If the cache file is accessed, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.","wp-super-cache",null,"\u003C1.4.5","1.4.5","high",8.1,"CVSS:3.1\u002FAV:N\u002FAC:H\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Deserialization of Untrusted Data","2015-09-25 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F634ccd08-4f2e-4a06-8c64-dfe38fa3a481?source=api-prod",3042]