mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
37 lines
1.8 KiB
JSON
37 lines
1.8 KiB
JSON
{
|
|
"id": "CVE-2024-49593",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-10-17T04:15:03.440",
|
|
"lastModified": "2024-10-18T12:53:04.627",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "In Advanced Custom Fields (ACF) before 6.3.9 and Secure Custom Fields before 6.3.6.3 (plugins for WordPress), using the Field Group editor to edit one of the plugin's fields can result in execution of a stored XSS payload. NOTE: if you wish to use the WP Engine alternative update mechanism for the free version of ACF, then you can follow the process shown at the advancedcustomfields.com blog URL within the References section below."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "En Advanced Custom Fields (ACF) anterior a la versi\u00f3n 6.3.9 y Secure Custom Fields anterior a la versi\u00f3n 6.3.6.3 (complementos para WordPress), el uso del editor de grupos de campos para editar uno de los campos del complemento puede provocar la ejecuci\u00f3n de un payload XSS almacenado. NOTA: si desea utilizar el mecanismo de actualizaci\u00f3n alternativo de WP Engine para la versi\u00f3n gratuita de ACF, puede seguir el proceso que se muestra en la URL del blog advancedcustomfields.com dentro de la secci\u00f3n Referencias a continuaci\u00f3n."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://wordpress.org/plugins/advanced-custom-fields/#developers",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.advancedcustomfields.com/blog/installing-and-upgrading-to-the-latest-version-of-acf/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.advancedcustomfields.com/changelog/",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://x.com/wp_acf/status/1845190372764401908",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |