diff --git a/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md b/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md index 856cf5f2..1d91b180 100644 --- a/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md +++ b/docs/advisories/20240626003-WordPress-Plugin-Vulnerabilities.md @@ -6,12 +6,12 @@ Several plugins for WordPress hosted on WordPress.org have been compromised and ## What is vulnerable? -| Products Affected. | CVE | CVSS | Severity | -| ------------------- | ----------------------------------------------------------------- | ---- | ------------ | -| **[List of Affected Products](https://www.cve.org/CVERecord?id=CVE-2024-6297)** | [CVE-2024-6297](https://www.cve.org/CVERecord?id=CVE-2024-6297) | 10 | **Critical** | +| Products Affected. | CVE | CVSS | Severity | +| ------------------------------------------------------------------------------- | --------------------------------------------------------------- | ---- | ------------ | +| **[List of Affected Products](https://www.cve.org/CVERecord?id=CVE-2024-6297)** | [CVE-2024-6297](https://www.cve.org/CVERecord?id=CVE-2024-6297) | 10 | **Critical** | ## Recommendation The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)): -- https://www.wordfence.com/threat-intel/vulnerabilities/detail/several-wordpressorg-plugins-various-versions-injected-backdoor \ No newline at end of file +- https://www.wordfence.com/threat-intel/vulnerabilities/detail/several-wordpressorg-plugins-various-versions-injected-backdoor