A vulnerability was found in PlusCaptcha Plugin up to 2.0.6 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.14 is able to address this issue. The patch is identified as 1274afc635170daafd38306487b6bb8a01f78ecd. It is recommended to upgrade the affected component. VDB-248954 is the identifier assigned to this vulnerability.
References
Link | Resource |
---|---|
https://github.com/wp-plugins/pluscaptcha/commit/1274afc635170daafd38306487b6bb8a01f78ecd | Patch |
https://vuldb.com/?ctiid.248954 | Third Party Advisory |
https://vuldb.com/?id.248954 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-12-26T17:00:04.667Z
Updated: 2023-12-26T17:00:04.667Z
Reserved: 2023-12-24T13:08:49.363Z
Link: CVE-2015-10127
JSON object: View
NVD Information
Status : Modified
Published: 2023-12-26T17:15:07.923
Modified: 2024-05-17T01:03:11.270
Link: CVE-2015-10127
JSON object: View
Redhat Information
No data.
CWE