First published: Mon Apr 10 2023(Updated: )
A vulnerability, which was classified as problematic, was found in BestWebSoft Facebook Like Button up to 2.33. Affected is the function fcbkbttn_settings_page of the file facebook-button-plugin.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.34 is able to address this issue. The patch is identified as b766da8fa100779409a953f0e46c2a2448cbe99c. It is recommended to upgrade the affected component. VDB-225354 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Bestwebsoft Facebook Button | <2.34 | |
<2.34 |
https://github.com/wp-plugins/facebook-button-plugin/commit/b766da8fa100779409a953f0e46c2a2448cbe99c
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2014-125097.
The severity rating of CVE-2014-125097 is medium with a value of 6.1.
The affected software for CVE-2014-125097 is BestWebSoft Facebook Like Button up to version 2.33.
The CWE category for CVE-2014-125097 is CWE-79 (Cross-Site Scripting).
Yes, it is possible to launch the attack remotely for CVE-2014-125097.