{"id":3088,"date":"2024-03-04T14:45:24","date_gmt":"2024-03-04T14:45:24","guid":{"rendered":"http:\/\/127.0.0.1\/blue-triad-ezanalytics-1-0-xss-reflejado-a-traves-de-bt_webid\/"},"modified":"2024-03-04T14:45:24","modified_gmt":"2024-03-04T14:45:24","slug":"blue-triad-ezanalytics-1-0-xss-reflejado-a-traves-de-bt_webid","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/blue-triad-ezanalytics-1-0-xss-reflejado-a-traves-de-bt_webid\/","title":{"rendered":"Blue Triad EZAnalytics <= 1.0 – XSS Reflejado a trav\u00e9s de 'bt_webid'"},"content":{"rendered":"
<\/p>\n
El plugin Blue Triad EZAnalytics para WordPress es vulnerable a XSS Reflejado a trav\u00e9s del par\u00e1metro ‘bt_webid’ en todas las versiones hasta, e incluyendo, la 1.0 debido a una insuficiente sanitizaci\u00f3n de entradas y escape de salidas. Esto permite a atacantes no autenticados inyectar secuencias de comandos web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n si […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[801],"class_list":["post-3088","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-1782"],"yoast_head":"\n