{"id":3065,"date":"2024-02-29T20:45:37","date_gmt":"2024-02-29T20:45:37","guid":{"rendered":"http:\/\/127.0.0.1\/addons-exclusivos-para-elementor-2-6-9-cross-site-scripting-almacenado-autenticado-contribuidor-a-traves-del-widget-de-llamada-a-la-accion\/"},"modified":"2024-02-29T20:45:37","modified_gmt":"2024-02-29T20:45:37","slug":"addons-exclusivos-para-elementor-2-6-9-cross-site-scripting-almacenado-autenticado-contribuidor-a-traves-del-widget-de-llamada-a-la-accion","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/addons-exclusivos-para-elementor-2-6-9-cross-site-scripting-almacenado-autenticado-contribuidor-a-traves-del-widget-de-llamada-a-la-accion\/","title":{"rendered":"Addons Exclusivos para Elementor <= 2.6.9 – Cross-Site Scripting Almacenado Autenticado (Contribuidor+) a Trav\u00e9s del Widget de Llamada a la Acci\u00f3n"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad Cross-Site Scripting almacenado en el plugin Exclusive Addons for Elementor para WordPress, hasta la versi\u00f3n 2.6.9, permite a atacantes autenticados inyectar scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cuando un usuario acceda a dicha p\u00e1gina. La vulnerabilidad se debe a una insuficiente sanitizaci\u00f3n de entrada y escapado de salida en el widget […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[778],"class_list":["post-3065","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-1414"],"yoast_head":"\n