{"id":3921,"date":"2024-06-04T21:45:10","date_gmt":"2024-06-04T21:45:10","guid":{"rendered":"http:\/\/127.0.0.1\/gamipress-link-1-1-4-cross-site-scripting-almacenado-contribuidor-autenticado\/"},"modified":"2024-06-04T21:45:10","modified_gmt":"2024-06-04T21:45:10","slug":"gamipress-link-1-1-4-cross-site-scripting-almacenado-contribuidor-autenticado","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/gamipress-link-1-1-4-cross-site-scripting-almacenado-contribuidor-autenticado\/","title":{"rendered":"GamiPress \u2013 Link <= 1.1.4 – Cross-Site Scripting Almacenado (Contribuidor+) Autenticado"},"content":{"rendered":"
<\/p>\n
El plugin GamiPress \u2013 Link para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del shortcode gamipress_link en todas las versiones hasta, e incluyendo, la 1.1.4 debido a una insuficiente sanitizaci\u00f3n de la entrada y escape de la salida en atributos suministrados por el usuario. Esto permite a atacantes autenticados, con acceso de nivel […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1631],"class_list":["post-3921","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-5536"],"yoast_head":"\n