[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fx33pKcmRakGwp613COz8b_aQwSL6wblYt7YrxRKJf3Q":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"WF-0d50f217-7a53-49bf-9ce9-9922d0b3e18b-wp-ultimate-csv-importer","wp-ultimate-csv-importer-arbitrary-file-read","WP Ultimate CSV Importer \u003C= 3.7 - Arbitrary File Read","The WP Ultimate CSV Importer plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the templates\u002Freadfile.php file in versions up to, and including, 3.7. This makes it possible for unauthenticated attackers to read any files on the vulnerable service that PHP has access to.","wp-ultimate-csv-importer",null,"\u003C=3.7","3.7.1","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Improper Authentication","2015-04-27 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0d50f217-7a53-49bf-9ce9-9922d0b3e18b?source=api-prod",3193]