Vulnerability Description
A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.59 is able to address this issue. The identifier of the patch is d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. The identifier VDB-225265 was assigned to this vulnerability.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Exit Strategy Project | Exit Strategy | 1.55 |
Related Weaknesses (CWE)
References
- https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16Patch
- https://vuldb.com/?ctiid.225265Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.225265Permissions RequiredThird Party Advisory
- https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16Patch
- https://vuldb.com/?ctiid.225265Permissions RequiredThird Party Advisory
- https://vuldb.com/?id.225265Permissions RequiredThird Party Advisory
FAQ
What is CVE-2013-10024?
CVE-2013-10024 is a vulnerability with a CVSS score of 3.5 (LOW). A vulnerability has been found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this vulnerability is an unknown functionality of the file exitpage.php. The manipul...
How severe is CVE-2013-10024?
CVE-2013-10024 has been rated LOW with a CVSS base score of 3.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-10024?
Check the references section above for vendor advisories and patch information. Affected products include: Exit Strategy Project Exit Strategy.