A vulnerability classified as problematic has been found in WooFramework Branding Plugin up to 1.0.1 on WordPress. Affected is the function admin_screen_logic of the file wooframework-branding.php. The manipulation of the argument url leads to open redirect. It is possible to launch the attack remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is f12fccd7b5eaf66442346f748c901ef504742f78. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-230652.
References
Link | Resource |
---|---|
https://github.com/wp-plugins/wooframework-branding/commit/f12fccd7b5eaf66442346f748c901ef504742f78 | Patch |
https://vuldb.com/?ctiid.230652 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.230652 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-06-05T08:00:03.150Z
Updated: 2023-10-20T09:35:30.367Z
Reserved: 2023-06-03T07:38:39.202Z
Link: CVE-2015-10112
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-05T08:15:09.380
Modified: 2024-05-17T01:03:09.640
Link: CVE-2015-10112
JSON object: View
Redhat Information
No data.
CWE