5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
45.2%
A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on WordPress. It has been classified as problematic. Affected is the function twttr_settings_page of the file twitter.php of the component Settings Page. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 2.15 is able to address this issue. The patch is identified as a6d4659cbb2cbf18ccb0fb43549d5113d74e0146. It is recommended to upgrade the affected component. VDB-230154 is the identifier assigned to this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
bestwebsoft | 2.0 | cpe:2.3:a:bestwebsoft:twitter:2.0:*:*:*:*:*:*:* | |
bestwebsoft | 2.1 | cpe:2.3:a:bestwebsoft:twitter:2.1:*:*:*:*:*:*:* | |
bestwebsoft | 2.2 | cpe:2.3:a:bestwebsoft:twitter:2.2:*:*:*:*:*:*:* | |
bestwebsoft | 2.3 | cpe:2.3:a:bestwebsoft:twitter:2.3:*:*:*:*:*:*:* | |
bestwebsoft | 2.4 | cpe:2.3:a:bestwebsoft:twitter:2.4:*:*:*:*:*:*:* | |
bestwebsoft | 2.5 | cpe:2.3:a:bestwebsoft:twitter:2.5:*:*:*:*:*:*:* | |
bestwebsoft | 2.6 | cpe:2.3:a:bestwebsoft:twitter:2.6:*:*:*:*:*:*:* | |
bestwebsoft | 2.7 | cpe:2.3:a:bestwebsoft:twitter:2.7:*:*:*:*:*:*:* | |
bestwebsoft | 2.8 | cpe:2.3:a:bestwebsoft:twitter:2.8:*:*:*:*:*:*:* | |
bestwebsoft | 2.9 | cpe:2.3:a:bestwebsoft:twitter:2.9:*:*:*:*:*:*:* |
[
{
"vendor": "BestWebSoft",
"product": "Twitter Plugin",
"versions": [
{
"version": "2.0",
"status": "affected"
},
{
"version": "2.1",
"status": "affected"
},
{
"version": "2.2",
"status": "affected"
},
{
"version": "2.3",
"status": "affected"
},
{
"version": "2.4",
"status": "affected"
},
{
"version": "2.5",
"status": "affected"
},
{
"version": "2.6",
"status": "affected"
},
{
"version": "2.7",
"status": "affected"
},
{
"version": "2.8",
"status": "affected"
},
{
"version": "2.9",
"status": "affected"
},
{
"version": "2.10",
"status": "affected"
},
{
"version": "2.11",
"status": "affected"
},
{
"version": "2.12",
"status": "affected"
},
{
"version": "2.13",
"status": "affected"
},
{
"version": "2.14",
"status": "affected"
}
],
"modules": [
"Settings Page"
]
}
]
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.6 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
45.2%