{"id":4556,"date":"2024-08-21T08:15:09","date_gmt":"2024-08-21T08:15:09","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-en-wpml-multilingual-cms-4-6-12-ejecucion-remota-de-codigo-autenticada-contribuidor-a-traves-de-twig-server-side-template-injection\/"},"modified":"2024-08-21T08:15:09","modified_gmt":"2024-08-21T08:15:09","slug":"vulnerabilidad-en-wpml-multilingual-cms-4-6-12-ejecucion-remota-de-codigo-autenticada-contribuidor-a-traves-de-twig-server-side-template-injection","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-en-wpml-multilingual-cms-4-6-12-ejecucion-remota-de-codigo-autenticada-contribuidor-a-traves-de-twig-server-side-template-injection\/","title":{"rendered":"Vulnerabilidad en WPML Multilingual CMS <= 4.6.12 – Ejecuci\u00f3n Remota de C\u00f3digo Autenticada (Contribuidor+) a trav\u00e9s de Twig Server-Side Template Injection"},"content":{"rendered":"
<\/p>\n
El plugin WPML para WordPress es vulnerable a la Ejecuci\u00f3n Remota de C\u00f3digo en todas las versiones hasta, e incluyendo, la 4.6.12 a trav\u00e9s de la Inyecci\u00f3n de Plantillas en el Servidor Twig. Esto se debe a la falta de validaci\u00f3n y sanitizaci\u00f3n de entrada en la funci\u00f3n de renderizado. Esto permite que atacantes autenticados, […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2247],"class_list":["post-4556","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-6386"],"yoast_head":"\n