CVE-2013-10025
Published on: Not Yet Published
Last Modified on: 04/17/2023 01:59:00 PM UTC
Certain versions of Exit Strategy from Exit Strategy Project contain the following vulnerability:
A vulnerability was found in Exit Strategy Plugin 1.55 and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The name of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability.
- CVE-2013-10025 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 8.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Security improvements, preventing XSS, full path disclosure, and unpr… · wp-plugins/exit-strategy@d964b8e · GitHub | Patch github.com text/html |
![]() |
Permissions Required Third Party Advisory vuldb.com text/plain Inactive LinkNot Archived |
![]() | |
CVE-2013-10025 | Exit Strategy Plugin exitpage.php exitpageadmin cross-site request forgery | Third Party Advisory web.archive.org text/html Inactive LinkNot Archived |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Exit Strategy Project | Exit Strategy | 1.55 | All | All | All |
- cpe:2.3:a:exit_strategy_project:exit_strategy:1.55:*:*:*:*:wordpress:*:*:
No vendor comments have been submitted for this CVE