[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fFSDdRZT9IPqbG7MAGTFh6RFoJYuNhrwC8D24lbewuZE":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2023-23684","wpgraphql-authenticated-editor-server-side-request-forgery","WPGraphQL \u003C= 1.14.5 - Authenticated (Editor+) Server-Side Request Forgery","The WPGraphQL plugin for WordPress is vulnerable to Server-Side Request Forgery in versions up to, and including, 1.14.5 via createMediaItem. This can allow authenticated attackers with editor access or higher to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.","wp-graphql",null,"\u003C=1.14.5","1.14.6","medium",5.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:H\u002FUI:N\u002FS:C\u002FC:L\u002FI:L\u002FA:N","Server-Side Request Forgery (SSRF)","2023-06-28 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F38efd6d6-b931-41a7-b55d-b98cdeef4145?source=api-prod",209]