Vulnerabilites related to BestWebSoft - Twitter Plugin
CVE-2014-125103 (GCVE-0-2014-125103)
Vulnerability from cvelistv5
Published
2023-05-31 03:00
Modified
2025-03-05 18:58
Severity ?
2.4 (Low) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
2.4 (Low) - CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
2.4 (Low) - CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Cross Site Scripting
Summary
A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bws_license_plugin leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The patch is named e04d59ab578316ffeb204cf32dc71c0d0e1ff77c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230155.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
BestWebSoft | Twitter Plugin |
Version: 1.3.0 Version: 1.3.1 Version: 1.3.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:10:56.764Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.230155" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.230155" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/wp-plugins/twitter-plugin/commit/e04d59ab578316ffeb204cf32dc71c0d0e1ff77c" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2014-125103", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-03-05T18:36:52.308023Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-03-05T18:58:44.702Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Twitter Plugin", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "1.3.0" }, { "status": "affected", "version": "1.3.1" }, { "status": "affected", "version": "1.3.2" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in BestWebSoft Twitter Plugin up to 1.3.2 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function twttr_settings_page of the file twitter.php. The manipulation of the argument twttr_url_twitter/bws_license_key/bws_license_plugin leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.7 is able to address this issue. The patch is named e04d59ab578316ffeb204cf32dc71c0d0e1ff77c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230155." }, { "lang": "de", "value": "In BestWebSoft Twitter Plugin bis 1.3.2 f\u00fcr WordPress wurde eine problematische Schwachstelle ausgemacht. Es geht um die Funktion twttr_settings_page der Datei twitter.php. Mit der Manipulation des Arguments twttr_url_twitter/bws_license_key/bws_license_plugin mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann \u00fcber das Netzwerk erfolgen. Ein Aktualisieren auf die Version 1.3.7 vermag dieses Problem zu l\u00f6sen. Der Patch wird als e04d59ab578316ffeb204cf32dc71c0d0e1ff77c bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 2.4, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 3.3, "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross Site Scripting", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-20T07:22:27.884Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.230155" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.230155" }, { "tags": [ "patch" ], "url": "https://github.com/wp-plugins/twitter-plugin/commit/e04d59ab578316ffeb204cf32dc71c0d0e1ff77c" } ], "timeline": [ { "lang": "en", "time": "2014-08-07T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2014-08-07T00:00:00.000Z", "value": "Countermeasure disclosed" }, { "lang": "en", "time": "2023-05-29T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-05-29T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-06-21T22:21:25.000Z", "value": "VulDB entry last update" } ], "title": "BestWebSoft Twitter Plugin twitter.php twttr_settings_page cross site scripting" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2014-125103", "datePublished": "2023-05-31T03:00:03.284Z", "dateReserved": "2023-05-29T15:38:08.600Z", "dateUpdated": "2025-03-05T18:58:44.702Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-10015 (GCVE-0-2012-10015)
Vulnerability from cvelistv5
Published
2023-05-30 23:31
Modified
2024-08-06 21:36
Severity ?
4.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
4.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-352 - Cross-Site Request Forgery
Summary
A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on WordPress. It has been classified as problematic. Affected is the function twttr_settings_page of the file twitter.php of the component Settings Page. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 2.15 is able to address this issue. The patch is identified as a6d4659cbb2cbf18ccb0fb43549d5113d74e0146. It is recommended to upgrade the affected component. VDB-230154 is the identifier assigned to this vulnerability.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
BestWebSoft | Twitter Plugin |
Version: 2.0 Version: 2.1 Version: 2.2 Version: 2.3 Version: 2.4 Version: 2.5 Version: 2.6 Version: 2.7 Version: 2.8 Version: 2.9 Version: 2.10 Version: 2.11 Version: 2.12 Version: 2.13 Version: 2.14 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:36:02.356Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vdb-entry", "technical-description", "x_transferred" ], "url": "https://vuldb.com/?id.230154" }, { "tags": [ "signature", "permissions-required", "x_transferred" ], "url": "https://vuldb.com/?ctiid.230154" }, { "tags": [ "patch", "x_transferred" ], "url": "https://github.com/wp-plugins/twitter-plugin/commit/a6d4659cbb2cbf18ccb0fb43549d5113d74e0146" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "modules": [ "Settings Page" ], "product": "Twitter Plugin", "vendor": "BestWebSoft", "versions": [ { "status": "affected", "version": "2.0" }, { "status": "affected", "version": "2.1" }, { "status": "affected", "version": "2.2" }, { "status": "affected", "version": "2.3" }, { "status": "affected", "version": "2.4" }, { "status": "affected", "version": "2.5" }, { "status": "affected", "version": "2.6" }, { "status": "affected", "version": "2.7" }, { "status": "affected", "version": "2.8" }, { "status": "affected", "version": "2.9" }, { "status": "affected", "version": "2.10" }, { "status": "affected", "version": "2.11" }, { "status": "affected", "version": "2.12" }, { "status": "affected", "version": "2.13" }, { "status": "affected", "version": "2.14" } ] } ], "credits": [ { "lang": "en", "type": "tool", "value": "VulDB GitHub Commit Analyzer" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in BestWebSoft Twitter Plugin up to 2.14 on WordPress. It has been classified as problematic. Affected is the function twttr_settings_page of the file twitter.php of the component Settings Page. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 2.15 is able to address this issue. The patch is identified as a6d4659cbb2cbf18ccb0fb43549d5113d74e0146. It is recommended to upgrade the affected component. VDB-230154 is the identifier assigned to this vulnerability." }, { "lang": "de", "value": "Es wurde eine problematische Schwachstelle in BestWebSoft Twitter Plugin bis 2.14 f\u00fcr WordPress ausgemacht. Betroffen hiervon ist die Funktion twttr_settings_page der Datei twitter.php der Komponente Settings Page. Dank Manipulation mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff \u00fcber das Netzwerk. Ein Aktualisieren auf die Version 2.15 vermag dieses Problem zu l\u00f6sen. Der Patch wird als a6d4659cbb2cbf18ccb0fb43549d5113d74e0146 bezeichnet. Als bestm\u00f6gliche Massnahme wird das Einspielen eines Upgrades empfohlen." } ], "metrics": [ { "cvssV3_1": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 5, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-10-12T08:48:52.052Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.230154" }, { "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.230154" }, { "tags": [ "patch" ], "url": "https://github.com/wp-plugins/twitter-plugin/commit/a6d4659cbb2cbf18ccb0fb43549d5113d74e0146" } ], "timeline": [ { "lang": "en", "time": "2012-07-24T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2012-07-24T00:00:00.000Z", "value": "Countermeasure disclosed" }, { "lang": "en", "time": "2023-05-29T00:00:00.000Z", "value": "CVE reserved" }, { "lang": "en", "time": "2023-05-29T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2023-06-21T21:53:37.000Z", "value": "VulDB last update" } ], "title": "BestWebSoft Twitter Plugin Settings Page twitter.php twttr_settings_page cross-site request forgery" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2012-10015", "datePublished": "2023-05-30T23:31:02.724Z", "dateReserved": "2023-05-29T15:37:50.913Z", "dateUpdated": "2024-08-06T21:36:02.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }