{"id":4288,"date":"2024-07-15T18:45:43","date_gmt":"2024-07-15T18:45:43","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-csrf-en-i-transform-3-0-9\/"},"modified":"2024-07-15T18:45:43","modified_gmt":"2024-07-15T18:45:43","slug":"vulnerabilidad-csrf-en-i-transform-3-0-9","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-csrf-en-i-transform-3-0-9\/","title":{"rendered":"Vulnerabilidad CSRF en i-transform <= 3.0.9"},"content":{"rendered":"
<\/p>\n
El tema i-transform para WordPress es vulnerable a Cross-Site Request Forgery (CSRF) en versiones hasta, e incluyendo, la 3.0.9. Esto se debe a una validaci\u00f3n de nonce faltante o incorrecta en una funci\u00f3n. Esto permite que atacantes no autenticados realicen una acci\u00f3n no autorizada a trav\u00e9s de una solicitud falsificada, siempre y cuando puedan enga\u00f1ar […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1996],"class_list":["post-4288","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-38764"],"yoast_head":"\n