{"id":4040,"date":"2024-06-14T12:45:10","date_gmt":"2024-06-14T12:45:10","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-scripting-xss-en-jeg-elementor-kit-2-6-5\/"},"modified":"2024-06-14T12:45:10","modified_gmt":"2024-06-14T12:45:10","slug":"vulnerabilidad-de-cross-site-scripting-xss-en-jeg-elementor-kit-2-6-5","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-scripting-xss-en-jeg-elementor-kit-2-6-5\/","title":{"rendered":"Vulnerabilidad de Cross-Site Scripting (XSS) en Jeg Elementor Kit <= 2.6.5"},"content":{"rendered":"
<\/p>\n
La vulnerabilidad de Cross-Site Scripting (XSS) en el plugin Jeg Elementor Kit para WordPress puede ser explotada por atacantes autenticados con nivel de Contributor o superior. Esto permite la inyecci\u00f3n de scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cuando un usuario acceda a la p\u00e1gina afectada. La vulnerabilidad radica en la falta de saneamiento […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1750],"class_list":["post-4040","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-4479"],"yoast_head":"\n