{"id":4129,"date":"2024-06-21T15:45:41","date_gmt":"2024-06-21T15:45:41","guid":{"rendered":"http:\/\/127.0.0.1\/contentlock-1-0-3-cross-site-request-forgery-para-modificar-configuraciones\/"},"modified":"2024-06-21T15:45:41","modified_gmt":"2024-06-21T15:45:41","slug":"contentlock-1-0-3-cross-site-request-forgery-para-modificar-configuraciones","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/contentlock-1-0-3-cross-site-request-forgery-para-modificar-configuraciones\/","title":{"rendered":"ContentLock <= 1.0.3 – Cross-Site Request Forgery para Modificar Configuraciones"},"content":{"rendered":"
<\/p>\n
El plugin ContentLock para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.0.3. Esta vulnerabilidad se debe a la falta de validaci\u00f3n de nonce en una funci\u00f3n, lo que permite a atacantes no autenticados modificar la configuraci\u00f3n del plugin mediante una solicitud falsificada si logran enga\u00f1ar a un administrador del […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1839],"class_list":["post-4129","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6022"],"yoast_head":"\n