CVE-2023-5610

The Seraphinite Accelerator WordPress plugin before 2.2.29 does not validate the URL to redirect any authenticated user to, leading to an arbitrary redirect
References
Link Resource
https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e Exploit Product Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*

History

27 Nov 2023, 16:31

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e - () https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e - Exploit, Product, Third Party Advisory
CPE cpe:2.3:a:s-sols:seraphinite_accelerator:*:*:*:*:*:wordpress:*:*
First Time S-sols
S-sols seraphinite Accelerator
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CWE CWE-601

20 Nov 2023, 19:18

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-20 19:15

Updated : 2024-02-28 20:54


NVD link : CVE-2023-5610

Mitre link : CVE-2023-5610

CVE.ORG link : CVE-2023-5610


JSON object : View

Products Affected

s-sols

  • seraphinite_accelerator
CWE
CWE-601

URL Redirection to Untrusted Site ('Open Redirect')