{"id":4411,"date":"2024-08-02T21:30:12","date_gmt":"2024-08-02T21:30:12","guid":{"rendered":"http:\/\/seguridadwordpress.es\/zephyr-project-manager-3-3-100-cross-site-scripting-almacenado-subscriber-autenticado-a-traves-del-parametro-de-nombre-de-archivo\/"},"modified":"2024-08-02T21:30:12","modified_gmt":"2024-08-02T21:30:12","slug":"zephyr-project-manager-3-3-100-cross-site-scripting-almacenado-subscriber-autenticado-a-traves-del-parametro-de-nombre-de-archivo","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/zephyr-project-manager-3-3-100-cross-site-scripting-almacenado-subscriber-autenticado-a-traves-del-parametro-de-nombre-de-archivo\/","title":{"rendered":"Zephyr Project Manager <= 3.3.100 – Cross-Site Scripting almacenado (Subscriber+) autenticado a trav\u00e9s del par\u00e1metro de nombre de archivo"},"content":{"rendered":"
<\/p>\n
El plugin Zephyr Project Manager para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del par\u00e1metro ‘filename’ en todas las versiones hasta, e incluyendo, la 3.3.100 debido a una insuficiente sanitizaci\u00f3n de entrada y escape de salida. Esto permite a atacantes autenticados, con acceso de nivel de Suscriptor y superior, inyectar scripts web arbitrarios […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2115],"class_list":["post-4411","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-7356"],"yoast_head":"\n