CVE-2014-125109

A vulnerability was found in BestWebSoft Portfolio Plugin up to 2.27. It has been declared as problematic. This vulnerability affects the function bws_add_menu_render of the file bws_menu/bws_menu.php. The manipulation of the argument bwsmn_form_email leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 2.28 is able to address this issue. The name of the patch is d2ede580474665af56ff262a05783fbabe4529b8. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-248956.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bestwebsoft:portfolio:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
CVSS v2 : 4.0
v3 : 6.1
v2 : 4.0
v3 : 3.5
References () https://github.com/wp-plugins/portfolio/commit/d2ede580474665af56ff262a05783fbabe4529b8 - Patch () https://github.com/wp-plugins/portfolio/commit/d2ede580474665af56ff262a05783fbabe4529b8 - Patch
References () https://vuldb.com/?ctiid.248956 - Permissions Required, Third Party Advisory () https://vuldb.com/?ctiid.248956 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.248956 - Third Party Advisory () https://vuldb.com/?id.248956 - Third Party Advisory

05 Jan 2024, 15:15

Type Values Removed Values Added
CPE cpe:2.3:a:bestwebsoft:portfolio:*:*:*:*:*:wordpress:*:*
References () https://github.com/wp-plugins/portfolio/commit/d2ede580474665af56ff262a05783fbabe4529b8 - () https://github.com/wp-plugins/portfolio/commit/d2ede580474665af56ff262a05783fbabe4529b8 - Patch
References () https://vuldb.com/?ctiid.248956 - () https://vuldb.com/?ctiid.248956 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?id.248956 - () https://vuldb.com/?id.248956 - Third Party Advisory
First Time Bestwebsoft
Bestwebsoft portfolio
Summary
  • (es) Se encontró una vulnerabilidad en BestWebSoft Portfolio Plugin hasta 2.27. Ha sido declarada problemática. Esta vulnerabilidad afecta a la función bws_add_menu_render del archivo bws_menu/bws_menu.php. La manipulación del argumento bwsmn_form_email conduce a cross site scripting. El ataque se puede iniciar de forma remota. La actualización a la versión 2.28 puede solucionar este problema. El nombre del parche es d2ede580474665af56ff262a05783fbabe4529b8. Se recomienda actualizar el componente afectado. El identificador de esta vulnerabilidad es VDB-248956.
CVSS v2 : 4.0
v3 : 3.5
v2 : 4.0
v3 : 6.1

26 Dec 2023, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-26 15:15

Updated : 2024-11-21 02:03


NVD link : CVE-2014-125109

Mitre link : CVE-2014-125109

CVE.ORG link : CVE-2014-125109


JSON object : View

Products Affected

bestwebsoft

  • portfolio
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')