A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.
References
Link | Resource |
---|---|
https://github.com/meta4creations/post-duplicator/commit/ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594 | Patch |
https://github.com/meta4creations/post-duplicator/releases/tag/2.19 | Release Notes |
https://vuldb.com/?ctiid.221496 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.221496 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: VulDB
Published: 2023-02-20T17:00:05.423Z
Updated: 2023-10-20T11:19:12.288Z
Reserved: 2023-02-19T08:24:12.937Z
Link: CVE-2016-15027
JSON object: View
NVD Information
Status : Modified
Published: 2023-02-20T17:15:11.273
Modified: 2024-05-17T01:08:10.510
Link: CVE-2016-15027
JSON object: View
Redhat Information
No data.
CWE