A vulnerability has been found in Beeliked Microsite Plugin up to 1.0.1 on WordPress and classified as problematic. Affected by this vulnerability is the function embed_handler of the file beelikedmicrosite.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is d23bafb5d05fb2636a2b78331f9d3fca152903dc. It is recommended to upgrade the affected component. The identifier VDB-233365 was assigned to this vulnerability.
References
Link Resource
https://github.com/wp-plugins/beeliked-microsite/commit/d23bafb5d05fb2636a2b78331f9d3fca152903dc Patch
https://vuldb.com/?ctiid.233365 Permissions Required Third Party Advisory VDB Entry
https://vuldb.com/?id.233365 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: VulDB

Published: 2023-07-10T14:00:05.483Z

Updated: 2023-10-20T09:46:29.664Z

Reserved: 2023-07-08T19:35:08.175Z


Link: CVE-2015-10121

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2023-07-10T16:15:47.357

Modified: 2024-05-17T01:03:10.660


Link: CVE-2015-10121

JSON object: View

cve-icon Redhat Information

No data.

CWE