{"id":3640,"date":"2024-04-26T16:45:14","date_gmt":"2024-04-26T16:45:14","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-en-wp-ulike-conjunto-de-herramientas-de-marketing-de-wordpress-mas-avanzado-4-6-9-autenticado-contributor-a-traves-de-shortcodes\/"},"modified":"2024-04-26T16:45:14","modified_gmt":"2024-04-26T16:45:14","slug":"vulnerabilidad-de-inyeccion-sql-en-wp-ulike-conjunto-de-herramientas-de-marketing-de-wordpress-mas-avanzado-4-6-9-autenticado-contributor-a-traves-de-shortcodes","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-en-wp-ulike-conjunto-de-herramientas-de-marketing-de-wordpress-mas-avanzado-4-6-9-autenticado-contributor-a-traves-de-shortcodes\/","title":{"rendered":"Vulnerabilidad de Inyecci\u00f3n SQL en WP ULike \u2013 Conjunto de Herramientas de Marketing de WordPress m\u00e1s Avanzado <= 4.6.9 – Autenticado (Contributor+) a trav\u00e9s de Shortcodes"},"content":{"rendered":"
<\/p>\n
El plugin WP ULike – Conjunto de Herramientas de Marketing de WordPress m\u00e1s Avanzado es vulnerable a Inyecci\u00f3n SQL a trav\u00e9s de los atributos ‘status’ e ‘id’ de los shortcodes ‘wp_ulike_counter’ y ‘wp_ulike’ en todas las versiones hasta, e incluyendo, la 4.6.9 debido a un escape insuficiente en el par\u00e1metro suministrado por el usuario y […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1350],"class_list":["post-3640","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-1797"],"yoast_head":"\n