First published: Sun Jun 04 2023(Updated: )
A vulnerability was found in Blogger Importer Plugin up to 0.5 on WordPress. It has been classified as problematic. Affected is the function start/restart of the file blogger-importer.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 0.6 is able to address this issue. The name of the patch is b83fa4f862b0f19a54cfee76060ec9c2e7f7ca70. It is recommended to upgrade the affected component. VDB-230658 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Wordpress Blogger Importer | <0.6 | |
<0.6 |
https://github.com/wp-plugins/blogger-importer/commit/b83fa4f862b0f19a54cfee76060ec9c2e7f7ca70
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2013-10027.
CVE-2013-10027 has a severity rating of 8.8, which is considered high.
The affected software for CVE-2013-10027 is the Blogger Importer Plugin up to version 0.5 on WordPress.
The CWE ID for CVE-2013-10027 is 352.
To mitigate the vulnerability in the Blogger Importer Plugin, it is recommended to upgrade to version 0.6 or higher.