{"id":4070,"date":"2024-06-18T14:46:13","date_gmt":"2024-06-18T14:46:13","guid":{"rendered":"http:\/\/127.0.0.1\/custom-product-list-table-3-0-0-cross-site-request-forgery\/"},"modified":"2024-06-18T14:46:13","modified_gmt":"2024-06-18T14:46:13","slug":"custom-product-list-table-3-0-0-cross-site-request-forgery","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/custom-product-list-table-3-0-0-cross-site-request-forgery\/","title":{"rendered":"Custom Product List Table <= 3.0.0 – Cross-Site Request Forgery"},"content":{"rendered":"
<\/p>\n
El plugin Custom Product List Table para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta, e incluyendo, la 3.0.0. Esto se debe a la falta o validaci\u00f3n incorrecta de nonce al modificar productos. Esto hace posible que atacantes no autenticados a\u00f1adan, eliminen, editen en masa, aprueben o cancelen productos a trav\u00e9s […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1780],"class_list":["post-4070","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-4541"],"yoast_head":"\n