First published: Tue Dec 26 2023(Updated: )
A vulnerability was found in PlusCaptcha Plugin up to 2.0.6 on WordPress and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting. The attack may be launched remotely. Upgrading to version 2.0.14 is able to address this issue. The patch is identified as 1274afc635170daafd38306487b6bb8a01f78ecd. It is recommended to upgrade the affected component. VDB-248954 is the identifier assigned to this vulnerability.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.0.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-10127 is classified as problematic due to its potential for cross-site scripting attacks.
To remediate CVE-2015-10127, upgrade the PlusCaptcha Plugin to version 2.0.14 or later.
CVE-2015-10127 is a cross-site scripting (XSS) vulnerability.
Yes, CVE-2015-10127 can be exploited remotely by attackers through vulnerable WordPress installations.
CVE-2015-10127 affects PlusCaptcha Plugin versions up to 2.0.6.