First published: Sun Apr 09 2023(Updated: )
A vulnerability has been found in BestWebSoft Facebook Like Button up to 2.13 and classified as problematic. Affected by this vulnerability is the function fcbk_bttn_plgn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The patch is named 33144ae5a45ed07efe7fceca901d91365fdbf7cb. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-225355.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bestwebsoft Facebook Button | <=2.13 | |
<=2.13 |
https://github.com/wp-plugins/facebook-button-plugin/commit/33144ae5a45ed07efe7fceca901d91365fdbf7cb
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-10012 is a vulnerability found in BestWebSoft Facebook Like Button up to version 2.13, which allows for cross-site request forgery attacks.
CVE-2012-10012 has a severity rating of 8.8, which is considered high.
Versions up to and including 2.13 of BestWebSoft Facebook Like Button for WordPress are affected by CVE-2012-10012.
CVE-2012-10012 is associated with CWE-352, which refers to Cross-Site Request Forgery (CSRF) vulnerabilities.
Yes, a fix for CVE-2012-10012 is available. It is recommended to update to a version of BestWebSoft Facebook Like Button beyond 2.13.