{"id":3643,"date":"2024-04-26T20:45:09","date_gmt":"2024-04-26T20:45:09","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-scripting-en-jeg-elementor-kit-2-6-4-a-traves-de-jkit-banner\/"},"modified":"2024-04-26T20:45:09","modified_gmt":"2024-04-26T20:45:09","slug":"vulnerabilidad-de-cross-site-scripting-en-jeg-elementor-kit-2-6-4-a-traves-de-jkit-banner","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-scripting-en-jeg-elementor-kit-2-6-4-a-traves-de-jkit-banner\/","title":{"rendered":"Vulnerabilidad de Cross-Site Scripting en Jeg Elementor Kit <= 2.6.4 a trav\u00e9s de JKit – Banner"},"content":{"rendered":"
<\/p>\n
El plugin Jeg Elementor Kit para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget JKit – Banner en todas las versiones hasta, e incluyendo, la 2.6.4 debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida en atributos proporcionados por usuarios. Esto permite a atacantes autenticados, con acceso de nivel contribuyente […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1353],"class_list":["post-3643","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-3819"],"yoast_head":"\n