{"id":4037,"date":"2024-06-13T19:45:20","date_gmt":"2024-06-13T19:45:20","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inclusion-de-archivos-remotos-no-autenticada-en-where-i-was-where-i-will-be-1-1-1\/"},"modified":"2024-06-13T19:45:20","modified_gmt":"2024-06-13T19:45:20","slug":"vulnerabilidad-de-inclusion-de-archivos-remotos-no-autenticada-en-where-i-was-where-i-will-be-1-1-1","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inclusion-de-archivos-remotos-no-autenticada-en-where-i-was-where-i-will-be-1-1-1\/","title":{"rendered":"Vulnerabilidad de Inclusi\u00f3n de Archivos Remotos no Autenticada en Where I Was, Where I Will Be <= 1.1.1"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad de Inclusi\u00f3n de Archivos Remotos en el plugin Where I Was, Where I Will Be para WordPress en la versi\u00f3n <= 1.1.1 permite a atacantes no autenticados incluir y ejecutar archivos arbitrarios alojados en servidores externos, lo que puede conducir a la ejecuci\u00f3n de c\u00f3digo malicioso. El plugin Where I Was, Where I […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1747],"class_list":["post-4037","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-5577"],"yoast_head":"\n