{ "id": "CVE-2015-1436", "sourceIdentifier": "cve@mitre.org", "published": "2015-02-16T15:59:07.120", "lastModified": "2019-03-13T15:52:46.190", "vulnStatus": "Analyzed", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Easing Slider plugin before 2.2.0.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the edit parameter in the (1) easingslider_manage_customizations or (2) easingslider_edit_sliders page to wp-admin/admin.php." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el plugin Easing Slider anterior a 2.2.0.7 para WordPress permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML a trav\u00e9s del par\u00e1metro edit en la p\u00e1gina (1) easingslider_manage_customizations o (2) easingslider_edit_sliders en wp-admin/admin.php." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "accessVector": "NETWORK", "accessComplexity": "MEDIUM", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "availabilityImpact": "NONE", "baseScore": 4.3 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.6, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-79" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:easing_slider_project:easing_slider:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.2.0.6", "matchCriteriaId": "7AE28D89-73CD-4AB3-9CA2-048AB02344F7" } ] } ] } ], "references": [ { "url": "http://packetstormsecurity.com/files/130355/WordPress-Easing-Slider-2.2.0.6-Cross-Site-Scripting.html", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securityfocus.com/archive/1/534680/100/0/threaded", "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ] }, { "url": "http://www.securityfocus.com/bid/72572", "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/100861", "source": "cve@mitre.org", "tags": [ "VDB Entry" ] }, { "url": "https://wordpress.org/plugins/easing-slider/changelog/", "source": "cve@mitre.org", "tags": [ "Patch", "Release Notes" ] }, { "url": "https://www.htbridge.com/advisory/HTB23249", "source": "cve@mitre.org", "tags": [ "Exploit" ] } ] }