[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fXZ1B5ItU4IUM4XNNhj76dsWBomerTWWUDiUdULmU9Cs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2021-31157","wpgraphql-denial-of-service","WPGraphQL \u003C= 1.3.5 - Denial of Service","The WPGraphQL plugin for WordPress is vulnerable to Denial of Service via field duplication in versions up to, and including, 1.3.5. This makes it possible for unauthenticated attackers to rapidly duplicate fields and queries resulting in OOM and MySQL connection errors.","wp-graphql",null,"\u003C=1.3.5","1.3.6","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:N\u002FA:L","Uncontrolled Resource Consumption","2021-04-27 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fdd22276b-41d4-4795-a79e-d770d0cf4b76?source=api-prod",1001]