First published: Mon Jun 05 2023(Updated: )
A vulnerability classified as problematic was found in WooFramework Tweaks Plugin up to 1.0.1 on WordPress. Affected by this vulnerability is the function admin_screen_logic of the file wooframework-tweaks.php. The manipulation of the argument url leads to open redirect. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The identifier of the patch is 3b57d405149c1a59d1119da6e0bb8212732c9c88. It is recommended to upgrade the affected component. The identifier VDB-230653 was assigned to this vulnerability.
Credit: cna@vuldb.com cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Woocommerce Wooframework Tweaks | <1.0.2 | |
<1.0.2 |
https://github.com/wp-plugins/wooframework-tweaks/commit/3b57d405149c1a59d1119da6e0bb8212732c9c88
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-10113 is medium.
The affected software of CVE-2015-10113 is WooFramework Tweaks Plugin up to version 1.0.1 on WordPress.
The vulnerability type of CVE-2015-10113 is an open redirect.
To fix CVE-2015-10113, update WooFramework Tweaks Plugin to version 1.0.2 or later.
The CWE ID of CVE-2015-10113 is 601.