{"id":4277,"date":"2024-07-12T08:45:07","date_gmt":"2024-07-12T08:45:07","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-scripting-en-userfeedback-lite-1-0-15-a-traves-del-parametro-name-sin-autenticacion\/"},"modified":"2024-07-12T08:45:07","modified_gmt":"2024-07-12T08:45:07","slug":"vulnerabilidad-de-cross-site-scripting-en-userfeedback-lite-1-0-15-a-traves-del-parametro-name-sin-autenticacion","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-scripting-en-userfeedback-lite-1-0-15-a-traves-del-parametro-name-sin-autenticacion\/","title":{"rendered":"Vulnerabilidad de Cross-Site Scripting en UserFeedback Lite <= 1.0.15 a trav\u00e9s del Par\u00e1metro Name sin Autenticaci\u00f3n"},"content":{"rendered":"
<\/p>\n
El plugin User Feedback – Crea Formularios de Retroalimentaci\u00f3n Interactivos, Encuestas de Usuario y Encuestas en Segundos para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro name en todas las versiones hasta, e incluyendo, la 1.0.15 debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida. Esto permite que atacantes no […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1985],"class_list":["post-4277","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-5902"],"yoast_head":"\n