{"id":3426,"date":"2024-04-03T15:45:29","date_gmt":"2024-04-03T15:45:29","guid":{"rendered":"http:\/\/127.0.0.1\/spectra-wordpress-gutenberg-blocks-2-10-3-xss-autenticado-contribuidor-a-traves-de-css-personalizado\/"},"modified":"2024-04-03T15:45:29","modified_gmt":"2024-04-03T15:45:29","slug":"spectra-wordpress-gutenberg-blocks-2-10-3-xss-autenticado-contribuidor-a-traves-de-css-personalizado","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/spectra-wordpress-gutenberg-blocks-2-10-3-xss-autenticado-contribuidor-a-traves-de-css-personalizado\/","title":{"rendered":"Spectra \u2013 WordPress Gutenberg Blocks <= 2.10.3 – XSS Autenticado (Contribuidor+) a trav\u00e9s de CSS Personalizado"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad CVE-2023-6486 afecta al plugin Spectra \u2013 WordPress Gutenberg Blocks para WordPress, permitiendo a atacantes autenticados con nivel de contribuidor o superior realizar ataques de Cross-Site Scripting almacenado a trav\u00e9s del metabox de CSS personalizado. La falta de saneamiento de entrada y escape de salida en el plugin Spectra \u2013 WordPress Gutenberg Blocks hasta […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1136],"class_list":["post-3426","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2023-6486"],"yoast_head":"\n