{"id":4000,"date":"2024-06-10T21:45:10","date_gmt":"2024-06-10T21:45:10","guid":{"rendered":"http:\/\/127.0.0.1\/ocean-extra-2-2-8-cross-site-scripting-almacenado-autenticado-contribuidor-a-traves-del-widget-de-flickr\/"},"modified":"2024-06-10T21:45:10","modified_gmt":"2024-06-10T21:45:10","slug":"ocean-extra-2-2-8-cross-site-scripting-almacenado-autenticado-contribuidor-a-traves-del-widget-de-flickr","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/ocean-extra-2-2-8-cross-site-scripting-almacenado-autenticado-contribuidor-a-traves-del-widget-de-flickr\/","title":{"rendered":"Ocean Extra <= 2.2.8 – Cross-Site Scripting almacenado autenticado (Contribuidor+) a trav\u00e9s del widget de Flickr"},"content":{"rendered":"
<\/p>\n
El plugin Ocean Extra para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de Flickr en todas las versiones hasta, e incluyendo, la 2.2.8 debido a una sanitizaci\u00f3n insuficiente de la entrada y a la falta de escape en la salida de atributos proporcionados por el usuario. Esto permite a atacantes autenticados, […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1710],"class_list":["post-4000","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-5531"],"yoast_head":"\n