{"id":3244,"date":"2024-03-19T16:45:11","date_gmt":"2024-03-19T16:45:11","guid":{"rendered":"http:\/\/127.0.0.1\/traduce-wordpress-y-hazlo-multilingue-weglot-4-2-5-cross-site-scripting-almacenado-autenticado-contributor-a-traves-de-atributos-de-bloque\/"},"modified":"2024-03-19T16:45:11","modified_gmt":"2024-03-19T16:45:11","slug":"traduce-wordpress-y-hazlo-multilingue-weglot-4-2-5-cross-site-scripting-almacenado-autenticado-contributor-a-traves-de-atributos-de-bloque","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/traduce-wordpress-y-hazlo-multilingue-weglot-4-2-5-cross-site-scripting-almacenado-autenticado-contributor-a-traves-de-atributos-de-bloque\/","title":{"rendered":"Traduce WordPress y hazlo Multiling\u00fce – Weglot <= 4.2.5 – Cross-Site Scripting Almacenado Autenticado (Contributor+) a trav\u00e9s de Atributos de Bloque"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad de Cross-Site Scripting Almacenado en el plugin Translate WordPress and go Multilingual – Weglot para WordPress en versiones hasta la 4.2.5 permite a atacantes autenticados inyectar scripts web arbitrarios en p\u00e1ginas, lo que representa un riesgo de seguridad para los usuarios del plugin. El plugin Translate WordPress and go Multilingual – Weglot hasta […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[956],"class_list":["post-3244","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-2124"],"yoast_head":"\n