{"id":4335,"date":"2024-07-19T20:45:08","date_gmt":"2024-07-19T20:45:08","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-autenticada-en-plugin-seo-by-squirrly-seo-12-3-19-a-traves-del-parametro-url\/"},"modified":"2024-07-19T20:45:08","modified_gmt":"2024-07-19T20:45:08","slug":"vulnerabilidad-de-inyeccion-sql-autenticada-en-plugin-seo-by-squirrly-seo-12-3-19-a-traves-del-parametro-url","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-autenticada-en-plugin-seo-by-squirrly-seo-12-3-19-a-traves-del-parametro-url\/","title":{"rendered":"Vulnerabilidad de Inyecci\u00f3n SQL Autenticada en Plugin SEO by Squirrly SEO <= 12.3.19 a trav\u00e9s del Par\u00e1metro url"},"content":{"rendered":"
<\/p>\n
El plugin SEO by Squirrly SEO para WordPress es vulnerable a la inyecci\u00f3n SQL almacenada a trav\u00e9s del par\u00e1metro ‘url’ en todas las versiones hasta, e incluyendo, la 12.3.19 debido a una insuficiente sanitizaci\u00f3n de la entrada y escape de la salida. Esto permite a atacantes autenticados, con acceso de nivel Contribuidor y superior, inyectar […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2043],"class_list":["post-4335","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6497"],"yoast_head":"\n