{"id":4348,"date":"2024-07-23T15:45:15","date_gmt":"2024-07-23T15:45:15","guid":{"rendered":"http:\/\/127.0.0.1\/litespeed-cache-6-2-0-1-cross-site-request-forgery-to-stored-cross-site-scripting\/"},"modified":"2024-07-23T15:45:15","modified_gmt":"2024-07-23T15:45:15","slug":"litespeed-cache-6-2-0-1-cross-site-request-forgery-to-stored-cross-site-scripting","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/litespeed-cache-6-2-0-1-cross-site-request-forgery-to-stored-cross-site-scripting\/","title":{"rendered":"LiteSpeed Cache <= 6.2.0.1 – Cross-Site Request Forgery to Stored Cross-Site Scripting"},"content":{"rendered":"
<\/p>\n
El plugin LiteSpeed Cache para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta, e incluyendo, la 6.2.0.1. Esto se debe a la validaci\u00f3n de nonce faltante o incorrecta. Esto hace posible que atacantes no autenticados actualicen la configuraci\u00f3n del token e inyecten JavaScript malicioso a trav\u00e9s de una petici\u00f3n falsificada, siempre […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2056],"class_list":["post-4348","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-3246"],"yoast_head":"\n