{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2013-10025","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-04-07T08:02:42.236Z","datePublished":"2023-04-08T17:00:06.527Z","dateUpdated":"2024-08-06T18:09:17.148Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T05:42:29.666Z"},"title":"Exit Strategy Plugin exitpage.php exitpageadmin cross-site request forgery","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-352","lang":"en","description":"CWE-352 Cross-Site Request Forgery"}]}],"affected":[{"vendor":"n/a","product":"Exit Strategy Plugin","versions":[{"version":"1.55","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Exit Strategy Plugin 1.55 on WordPress and classified as problematic. Affected by this issue is the function exitpageadmin of the file exitpage.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 1.59 is able to address this issue. The patch is identified as d964b8e961b2634158719f3328f16eda16ce93ac. It is recommended to upgrade the affected component. VDB-225266 is the identifier assigned to this vulnerability."},{"lang":"de","value":"Eine Schwachstelle wurde in Exit Strategy Plugin 1.55 für WordPress gefunden. Sie wurde als problematisch eingestuft. Es geht hierbei um die Funktion exitpageadmin der Datei exitpage.php. Durch Manipulieren mit unbekannten Daten kann eine cross-site request forgery-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Ein Aktualisieren auf die Version 1.59 vermag dieses Problem zu lösen. Der Patch wird als d964b8e961b2634158719f3328f16eda16ce93ac bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5,"vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N"}}],"timeline":[{"time":"2023-04-07T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-04-07T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-04-07T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-24T13:39:36.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.225266","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.225266","tags":["signature","permissions-required"]},{"url":"https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16eda16ce93ac","tags":["patch"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T18:09:17.148Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.225266","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.225266","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/wp-plugins/exit-strategy/commit/d964b8e961b2634158719f3328f16eda16ce93ac","tags":["patch","x_transferred"]}]}]}}