{"id":3282,"date":"2024-03-21T15:45:21","date_gmt":"2024-03-21T15:45:21","guid":{"rendered":"http:\/\/127.0.0.1\/getwid-gutenberg-blocks-2-0-5-cross-site-scripting-almacenado-autenticado-contributor-a-traves-del-contenido-del-bloque\/"},"modified":"2024-03-21T15:45:21","modified_gmt":"2024-03-21T15:45:21","slug":"getwid-gutenberg-blocks-2-0-5-cross-site-scripting-almacenado-autenticado-contributor-a-traves-del-contenido-del-bloque","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/getwid-gutenberg-blocks-2-0-5-cross-site-scripting-almacenado-autenticado-contributor-a-traves-del-contenido-del-bloque\/","title":{"rendered":"Getwid \u2013 Gutenberg Blocks <= 2.0.5 – Cross-Site Scripting Almacenado autenticado (Contributor+) a trav\u00e9s del contenido del bloque"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad CVE-2024-1948 afecta al plugin Getwid – Gutenberg Blocks para WordPress en versiones hasta 2.0.5, permitiendo a atacantes autenticados con nivel de contribuidor o superior inyectar scripts web maliciosos en p\u00e1ginas que se ejecutar\u00e1n cuando un usuario acceda a la p\u00e1gina comprometida. La vulnerabilidad de Cross-Site Scripting almacenado se debe a la insuficiente sanitizaci\u00f3n […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[994],"class_list":["post-3282","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-1948"],"yoast_head":"\n