{"id":4100,"date":"2024-06-19T14:45:34","date_gmt":"2024-06-19T14:45:34","guid":{"rendered":"http:\/\/127.0.0.1\/jetwidgets-para-elementor-1-0-17-cross-site-scripting-almacenado-autenticado-colaborador-a-traves-de-los-parametros-layout_type-e-id\/"},"modified":"2024-06-19T14:45:34","modified_gmt":"2024-06-19T14:45:34","slug":"jetwidgets-para-elementor-1-0-17-cross-site-scripting-almacenado-autenticado-colaborador-a-traves-de-los-parametros-layout_type-e-id","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/jetwidgets-para-elementor-1-0-17-cross-site-scripting-almacenado-autenticado-colaborador-a-traves-de-los-parametros-layout_type-e-id\/","title":{"rendered":"JetWidgets para Elementor <= 1.0.17 – Cross-Site Scripting almacenado autenticado (Colaborador+) a trav\u00e9s de los par\u00e1metros layout_type e id"},"content":{"rendered":"
<\/p>\n
El plugin JetWidgets para Elementor en WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s de los par\u00e1metros ‘layout_type’ e ‘id’ en todas las versiones hasta, e incluyendo, la 1.0.17 debido a una sanitizaci\u00f3n insuficiente de la entrada y al escape de la salida. Esto permite a atacantes autenticados, con acceso de nivel colaborador y […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1810],"class_list":["post-4100","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-4626"],"yoast_head":"\n