CVE-2015-10121

A vulnerability has been found in Beeliked Microsite Plugin up to 1.0.1 on WordPress and classified as problematic. Affected by this vulnerability is the function embed_handler of the file beelikedmicrosite.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is d23bafb5d05fb2636a2b78331f9d3fca152903dc. It is recommended to upgrade the affected component. The identifier VDB-233365 was assigned to this vulnerability.
References
Link Resource
https://github.com/wp-plugins/beeliked-microsite/commit/d23bafb5d05fb2636a2b78331f9d3fca152903dc Patch
https://vuldb.com/?ctiid.233365 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.233365 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:beeliked:beeliked:*:*:*:*:*:wordpress:*:*

History

14 Jul 2023, 14:47

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1
References (MISC) https://vuldb.com/?ctiid.233365 - (MISC) https://vuldb.com/?ctiid.233365 - Permissions Required, Third Party Advisory, VDB Entry
References (MISC) https://github.com/wp-plugins/beeliked-microsite/commit/d23bafb5d05fb2636a2b78331f9d3fca152903dc - (MISC) https://github.com/wp-plugins/beeliked-microsite/commit/d23bafb5d05fb2636a2b78331f9d3fca152903dc - Patch
References (MISC) https://vuldb.com/?id.233365 - (MISC) https://vuldb.com/?id.233365 - Third Party Advisory, VDB Entry
CPE cpe:2.3:a:beeliked:beeliked:*:*:*:*:*:wordpress:*:*

10 Jul 2023, 16:27

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-10 16:15

Updated : 2024-05-17 01:03


NVD link : CVE-2015-10121

Mitre link : CVE-2015-10121

CVE.ORG link : CVE-2015-10121


JSON object : View

Products Affected

beeliked

  • beeliked
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')