First published: Mon Nov 20 2023(Updated: )
The Seraphinite Accelerator WordPress plugin before 2.2.29 does not validate the URL to redirect any authenticated user to, leading to an arbitrary redirect
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
S-sols Seraphinite Accelerator | <2.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-5610 is medium with a CVSS score of 5.4.
CVE-2023-5610 is an authenticated arbitrary redirect vulnerability in the Seraphinite Accelerator WordPress plugin before version 2.2.29.
The vulnerability allows authenticated users to redirect others to arbitrary URLs.
To fix CVE-2023-5610, update the Seraphinite Accelerator plugin to version 2.2.29 or later.
Yes, you can find more information about CVE-2023-5610 at the following URL: https://wpscan.com/vulnerability/e880a9fb-b089-4f98-9781-7d946f22777e