{"id":4580,"date":"2024-08-26T16:25:29","date_gmt":"2024-08-26T16:25:29","guid":{"rendered":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-request-forgery-en-el-plugin-blog-introduction-0-3-0\/"},"modified":"2024-08-26T16:25:29","modified_gmt":"2024-08-26T16:25:29","slug":"vulnerabilidad-de-cross-site-request-forgery-en-el-plugin-blog-introduction-0-3-0","status":"publish","type":"post","link":"http:\/\/127.0.0.1\/vulnerabilidad-de-cross-site-request-forgery-en-el-plugin-blog-introduction-0-3-0\/","title":{"rendered":"Vulnerabilidad de Cross-Site Request Forgery en el Plugin Blog Introduction <= 0.3.0"},"content":{"rendered":"
<\/p>\n
El plugin Blog Introduction para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta, e incluyendo, la 0.3.0. Esta vulnerabilidad se debe a una validaci\u00f3n de nonce faltante o incorrecta en una funci\u00f3n. Esto permite a atacantes no autenticados actualizar la configuraci\u00f3n del plugin a trav\u00e9s de una solicitud falsificada, siempre y […]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[2269],"class_list":["post-4580","post","type-post","status-publish","format-standard","hentry","category-uncategorized","tag-cve-2024-7862"],"yoast_head":"\n