{"api_version":"1","generated_at":"2026-04-30T06:16:12+00:00","cve":"CVE-2006-10001","urls":{"html":"https://cve.report/CVE-2006-10001","api":"https://cve.report/api/cve/CVE-2006-10001.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2006-10001","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2006-10001"},"summary":{"title":"CVE-2006-10001","description":"A vulnerability, which was classified as problematic, was found in Subscribe to Comments Plugin up to 2.0.7 on WordPress. This affects an unknown part of the file subscribe-to-comments.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The identifier of the patch is 9683bdf462fcac2f32b33be98f0b96497fbd1bb6. It is recommended to upgrade the affected component. The identifier VDB-222321 was assigned to this vulnerability.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-03-05 21:15:00","updated_at":"2023-11-07 01:58:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://vuldb.com/?id.222321","name":"https://vuldb.com/?id.222321","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://github.com/wp-plugins/subscribe-to-comments/commit/9683bdf462fcac2f32b33be98f0b96497fbd1bb6","name":"https://github.com/wp-plugins/subscribe-to-comments/commit/9683bdf462fcac2f32b33be98f0b96497fbd1bb6","refsource":"MISC","tags":[],"title":"version 2.0.8, XSS fix thanks to MustLive, more fixes for addresses w… · wp-plugins/subscribe-to-comments@9683bdf · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/wp-plugins/subscribe-to-comments/releases/tag/2.0.8","name":"https://github.com/wp-plugins/subscribe-to-comments/releases/tag/2.0.8","refsource":"MISC","tags":[],"title":"Release Adding version 2.0.8 · wp-plugins/subscribe-to-comments · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://vuldb.com/?ctiid.222321","name":"https://vuldb.com/?ctiid.222321","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2006-10001","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2006-10001","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2006","cve_id":"10001","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"pluginmirror","cpe5":"subscribe_to_comments","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2006-10001","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability, which was classified as problematic, was found in Subscribe to Comments Plugin up to 2.0.7 on WordPress. This affects an unknown part of the file subscribe-to-comments.php. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.0.8 is able to address this issue. The identifier of the patch is 9683bdf462fcac2f32b33be98f0b96497fbd1bb6. It is recommended to upgrade the affected component. The identifier VDB-222321 was assigned to this vulnerability."},{"lang":"deu","value":"Es wurde eine problematische Schwachstelle in Subscribe to Comments Plugin bis 2.0.7 für WordPress gefunden. Hiervon betroffen ist ein unbekannter Codeblock der Datei subscribe-to-comments.php. Dank der Manipulation mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Ein Aktualisieren auf die Version 2.0.8 vermag dieses Problem zu lösen. Der Patch wird als 9683bdf462fcac2f32b33be98f0b96497fbd1bb6 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross Site Scripting","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Subscribe to Comments Plugin","version":{"version_data":[{"version_affected":"=","version_value":"2.0.0"},{"version_affected":"=","version_value":"2.0.1"},{"version_affected":"=","version_value":"2.0.2"},{"version_affected":"=","version_value":"2.0.3"},{"version_affected":"=","version_value":"2.0.4"},{"version_affected":"=","version_value":"2.0.5"},{"version_affected":"=","version_value":"2.0.6"},{"version_affected":"=","version_value":"2.0.7"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.222321","refsource":"MISC","name":"https://vuldb.com/?id.222321"},{"url":"https://vuldb.com/?ctiid.222321","refsource":"MISC","name":"https://vuldb.com/?ctiid.222321"},{"url":"https://github.com/wp-plugins/subscribe-to-comments/commit/9683bdf462fcac2f32b33be98f0b96497fbd1bb6","refsource":"MISC","name":"https://github.com/wp-plugins/subscribe-to-comments/commit/9683bdf462fcac2f32b33be98f0b96497fbd1bb6"},{"url":"https://github.com/wp-plugins/subscribe-to-comments/releases/tag/2.0.8","refsource":"MISC","name":"https://github.com/wp-plugins/subscribe-to-comments/releases/tag/2.0.8"}]},"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer"}],"impact":{"cvss":[{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}]}},"nvd":{"publishedDate":"2023-03-05 21:15:00","lastModifiedDate":"2023-11-07 01:58:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.3,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:pluginmirror:subscribe_to_comments:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.0.8","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}