First published: Fri Mar 10 2023(Updated: )
A vulnerability has been found in Ad Blocking Detector Plugin up to 1.2.1 on WordPress and classified as problematic. This vulnerability affects unknown code of the file ad-blocking-detector.php. The manipulation leads to information disclosure. The attack can be initiated remotely. Upgrading to version 1.2.2 is able to address this issue. The patch is identified as 3312b9cd79e5710d1e282fc9216a4e5ab31b3d94. It is recommended to upgrade the affected component. VDB-222610 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Admiral Ad Blocking Detector | <1.2.2 |
https://github.com/wp-plugins/ad-blocking-detector/commit/3312b9cd79e5710d1e282fc9216a4e5ab31b3d94
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-125093 is classified as a problematic vulnerability due to its potential for information disclosure.
To remediate CVE-2014-125093, update the Ad Blocking Detector Plugin to version 1.2.2 or later.
CVE-2014-125093 affects the Ad Blocking Detector Plugin in WordPress versions prior to 1.2.2.
Yes, CVE-2014-125093 can be exploited remotely, allowing attackers to potentially access sensitive information.
The vulnerability in CVE-2014-125093 specifically affects the code within the ad-blocking-detector.php file.