CVE-2013-10023
Published on: Not Yet Published
Last Modified on: 04/17/2023 02:12:00 PM UTC
Certain versions of Editorial Calendar from Editorial Calendar Project contain the following vulnerability:
A vulnerability was found in Editorial Calendar Plugin up to 2.6. It has been declared as critical. Affected by this vulnerability is the function edcal_filter_where of the file edcal.php. The manipulation of the argument edcal_startDate/edcal_endDate leads to sql injection. The attack can be launched remotely. Upgrading to version 2.7 is able to address this issue. The name of the patch is a9277f13781187daee760b4dfd052b1b68e101cc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-225151.
- CVE-2013-10023 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
We are now validating the start and end dates before adding them to t… · wp-plugins/editorial-calendar@a9277f1 · GitHub | Patch github.com text/html |
![]() |
Login required | Third Party Advisory vuldb.com text/html Inactive LinkNot Archived |
![]() |
Third Party Advisory vuldb.com text/plain Inactive LinkNot Archived |
![]() | |
Release Tagging for release 2.7. · wp-plugins/editorial-calendar · GitHub | Release Notes github.com text/html |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Editorial Calendar Project | Editorial Calendar | All | All | All | All |
- cpe:2.3:a:editorial_calendar_project:editorial_calendar:*:*:*:*:*:wordpress:*:*:
No vendor comments have been submitted for this CVE