{"id":4463,"date":"2024-08-12T22:35:22","date_gmt":"2024-08-12T22:35:22","guid":{"rendered":"http:\/\/127.0.0.1\/js-help-desk-vulnerabilidad-de-inyeccion-de-codigo-php-sin-autenticacion-a-ejecucion-de-codigo-remoto\/"},"modified":"2024-08-12T22:35:22","modified_gmt":"2024-08-12T22:35:22","slug":"js-help-desk-vulnerabilidad-de-inyeccion-de-codigo-php-sin-autenticacion-a-ejecucion-de-codigo-remoto","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/js-help-desk-vulnerabilidad-de-inyeccion-de-codigo-php-sin-autenticacion-a-ejecucion-de-codigo-remoto\/","title":{"rendered":"JS Help Desk \u2013 Vulnerabilidad de inyecci\u00f3n de c\u00f3digo PHP sin autenticaci\u00f3n a ejecuci\u00f3n de c\u00f3digo remoto"},"content":{"rendered":"
<\/p>\n
El plugin JS Help Desk \u2013 The Ultimate Help Desk & Support Plugin para WordPress es vulnerable a inyecci\u00f3n de c\u00f3digo PHP que puede conducir a la ejecuci\u00f3n de c\u00f3digo remoto en todas las versiones hasta, e incluyendo, la 2.8.6 a trav\u00e9s de la funci\u00f3n ‘storeTheme’. Esta vulnerabilidad se debe a la falta de saneamiento […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2160],"class_list":["post-4463","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-7094"],"yoast_head":"\n