Lucene search

K
cvelistVulDBCVELIST:CVE-2015-10092
HistoryMar 06, 2023 - 5:31 a.m.

CVE-2015-10092 Qtranslate Slug Plugin class-qtranslate-slug.php add_slug_meta_box cross site scripting

2023-03-0605:31:04
CWE-79
VulDB
www.cve.org
wordpress
qtranslate slug plugin
cross site scripting
upgrade

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

34.7%

A vulnerability was found in Qtranslate Slug Plugin up to 1.1.16 on WordPress. It has been classified as problematic. Affected is the function add_slug_meta_box of the file includes/class-qtranslate-slug.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 1.1.17 is able to address this issue. The name of the patch is 74b3932696f9868e14563e51b7d0bb68c53bf5e4. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-222324.

CNA Affected

[
  {
    "vendor": "n/a",
    "product": "Qtranslate Slug Plugin",
    "versions": [
      {
        "version": "1.1.0",
        "status": "affected"
      },
      {
        "version": "1.1.1",
        "status": "affected"
      },
      {
        "version": "1.1.2",
        "status": "affected"
      },
      {
        "version": "1.1.3",
        "status": "affected"
      },
      {
        "version": "1.1.4",
        "status": "affected"
      },
      {
        "version": "1.1.5",
        "status": "affected"
      },
      {
        "version": "1.1.6",
        "status": "affected"
      },
      {
        "version": "1.1.7",
        "status": "affected"
      },
      {
        "version": "1.1.8",
        "status": "affected"
      },
      {
        "version": "1.1.9",
        "status": "affected"
      },
      {
        "version": "1.1.10",
        "status": "affected"
      },
      {
        "version": "1.1.11",
        "status": "affected"
      },
      {
        "version": "1.1.12",
        "status": "affected"
      },
      {
        "version": "1.1.13",
        "status": "affected"
      },
      {
        "version": "1.1.14",
        "status": "affected"
      },
      {
        "version": "1.1.15",
        "status": "affected"
      },
      {
        "version": "1.1.16",
        "status": "affected"
      }
    ]
  }
]

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:S/C:N/I:P/A:N

3.5 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N

0.001 Low

EPSS

Percentile

34.7%

Related for CVELIST:CVE-2015-10092