A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496.
References
Link | Resource |
---|---|
https://github.com/meta4creations/post-duplicator/commit/ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594 | Patch |
https://github.com/meta4creations/post-duplicator/releases/tag/2.19 | Release Notes |
https://vuldb.com/?ctiid.221496 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.221496 | Third Party Advisory |
https://github.com/meta4creations/post-duplicator/commit/ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594 | Patch |
https://github.com/meta4creations/post-duplicator/releases/tag/2.19 | Release Notes |
https://vuldb.com/?ctiid.221496 | Permissions Required Third Party Advisory |
https://vuldb.com/?id.221496 | Third Party Advisory |
Configurations
History
21 Nov 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 3.5 |
References | () https://github.com/meta4creations/post-duplicator/commit/ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594 - Patch | |
References | () https://github.com/meta4creations/post-duplicator/releases/tag/2.19 - Release Notes | |
References | () https://vuldb.com/?ctiid.221496 - Permissions Required, Third Party Advisory | |
References | () https://vuldb.com/?id.221496 - Third Party Advisory |
24 Oct 2023, 20:18
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-79 |
20 Oct 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
Summary | A vulnerability was found in meta4creations Post Duplicator Plugin 2.18 on WordPress. It has been classified as problematic. Affected is the function mtphr_post_duplicator_notice of the file includes/notices.php. The manipulation of the argument post-duplicated leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.19 is able to address this issue. The name of the patch is ca67c05e490c0cf93a1e9b2d93bfeff3dd96f594. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-221496. | |
CWE |
Information
Published : 2023-02-20 17:15
Updated : 2024-11-21 02:45
NVD link : CVE-2016-15027
Mitre link : CVE-2016-15027
CVE.ORG link : CVE-2016-15027
JSON object : View
Products Affected
metaphorcreations
- post_duplicator
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')