A vulnerability classified as problematic was found in WooFramework Tweaks Plugin up to 1.0.1 on WordPress. Affected by this vulnerability is the function admin_screen_logic of the file wooframework-tweaks.php. The manipulation of the argument url leads to open redirect. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is 3b57d405149c1a59d1119da6e0bb8212732c9c88. It is recommended to upgrade the affected component. The identifier VDB-230653 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/wp-plugins/wooframework-tweaks/commit/3b57d405149c1a59d1119da6e0bb8212732c9c88 | Patch |
https://vuldb.com/?ctiid.230653 | Permissions Required |
https://vuldb.com/?id.230653 | Permissions Required |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-06-05T15:31:03.462Z
Updated: 2023-10-20T09:36:43.532Z
Reserved: 2023-06-03T07:40:23.591Z
Link: CVE-2015-10113
JSON object: View
NVD Information
Status : Modified
Published: 2023-06-05T16:15:09.207
Modified: 2024-05-17T01:03:09.747
Link: CVE-2015-10113
JSON object: View
Redhat Information
No data.
CWE