{"id":4265,"date":"2024-07-10T18:45:07","date_gmt":"2024-07-10T18:45:07","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-en-wp-erp-1-13-0-a-traves-de-vendor_id\/"},"modified":"2024-07-10T18:45:07","modified_gmt":"2024-07-10T18:45:07","slug":"vulnerabilidad-de-inyeccion-sql-en-wp-erp-1-13-0-a-traves-de-vendor_id","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-en-wp-erp-1-13-0-a-traves-de-vendor_id\/","title":{"rendered":"Vulnerabilidad de inyecci\u00f3n SQL en WP ERP <= 1.13.0 a trav\u00e9s de vendor_id"},"content":{"rendered":"
<\/p>\n
El plugin de WordPress WP ERP es vulnerable a inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro ‘vendor_id’ en todas las versiones hasta, e incluyendo, la 1.13.0 debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto permite a atacantes autenticados, con […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1973],"class_list":["post-4265","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6666"],"yoast_head":"\n