{"id":4257,"date":"2024-07-09T19:45:15","date_gmt":"2024-07-09T19:45:15","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-reflected-cross-site-scripting-en-login-by-auth0-4-6-0-a-traves-de-parametro-wle\/"},"modified":"2024-07-09T19:45:15","modified_gmt":"2024-07-09T19:45:15","slug":"vulnerabilidad-de-reflected-cross-site-scripting-en-login-by-auth0-4-6-0-a-traves-de-parametro-wle","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-reflected-cross-site-scripting-en-login-by-auth0-4-6-0-a-traves-de-parametro-wle\/","title":{"rendered":"Vulnerabilidad de Reflected Cross-Site Scripting en Login by Auth0 <= 4.6.0 a trav\u00e9s de par\u00e1metro 'wle'"},"content":{"rendered":"
<\/p>\n
El plugin Login by Auth0 para WordPress es vulnerable a Reflected Cross-Site Scripting a trav\u00e9s del par\u00e1metro ‘wle’ en todas las versiones hasta, e incluyendo, la 4.6.0 debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida. Esto permite que atacantes no autenticados inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n si logran […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1965],"class_list":["post-4257","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2023-6813"],"yoast_head":"\n