{"id":4521,"date":"2024-08-16T22:35:26","date_gmt":"2024-08-16T22:35:26","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-en-tagdiv-opt-in-builder-1-4-4-authenticated-admin\/"},"modified":"2024-08-16T22:35:26","modified_gmt":"2024-08-16T22:35:26","slug":"vulnerabilidad-de-inyeccion-sql-en-tagdiv-opt-in-builder-1-4-4-authenticated-admin","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-inyeccion-sql-en-tagdiv-opt-in-builder-1-4-4-authenticated-admin\/","title":{"rendered":"Vulnerabilidad de Inyecci\u00f3n SQL en tagDiv Opt-In Builder <= 1.4.4 – Authenticated (Admin+)"},"content":{"rendered":"
<\/p>\n
El plugin tagDiv Opt-In Builder es vulnerable a Inyecci\u00f3n SQL a ciegas a trav\u00e9s del par\u00e1metro ‘couponId’ del endpoint de la API REST ‘recreate_stripe_subscription’ en las versiones hasta, e incluyendo, la 1.4.4 debido a un escape insuficiente en el par\u00e1metro suministrado por el usuario y falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2218],"class_list":["post-4521","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2023-3419"],"yoast_head":"\n