A vulnerability, which was classified as critical, has been found in Freshdesk Plugin 1.7 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to open redirect. The attack may be launched remotely. Upgrading to version 1.8 is able to address this issue. The patch is identified as 2aaecd4e0c7c6c1dc4e6a593163d5f7aa0fa5d5b. It is recommended to upgrade the affected component. VDB-226118 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/wp-plugins/freshdesk-support/commit/2aaecd4e0c7c6c1dc4e6a593163d5f7aa0fa5d5b | Patch |
https://vuldb.com/?ctiid.226118 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.226118 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-04-17T18:00:05.437Z
Updated: 2023-10-20T09:23:17.659Z
Reserved: 2023-04-15T20:46:09.323Z
Link: CVE-2015-10102
JSON object: View
NVD Information
Status : Modified
Published: 2023-04-17T18:15:07.197
Modified: 2024-05-17T01:03:08.253
Link: CVE-2015-10102
JSON object: View
Redhat Information
No data.
CWE