CVE-2015-10132

CVSS 3.1 Score 3.5 of 10 (low)

Details

Published Apr 21, 2024
Updated: Apr 22, 2024
CWE ID 79

Summary

A cross-site scripting vulnerability, identified as CVE-2015-10132, has been found in Thimo Grauerholz WP-Spreadplugin up to version 3.8.6.1 on WordPress. This vulnerability affects the spreadplugin.php file and can be exploited remotely, allowing for potential cross-site scripting attacks. The issue can be addressed by upgrading to version 3.8.6.6, which includes a patch with the identifier a9b9afc641854698e80aa5dd9ababfc8e0e57d69. The affected products are vi-yOO and vi-yOP. The vulnerability has a base severity rating of LOW and a CVSS score of 3.5, with an exploitability score of 2.1 out of 10. It is important for organizations using the affected component to upgrade to the patched version to mitigate the risk of exploitation and potential compromise of system integrity.

Prevent cyber attacks with Recorded Future by prioritizing and patching critical vulnerabilities being exploited by threat actors targeting your industry. Book your demo to learn more.

Share

Prioritize, Pinpoint, and Act to Prevent Vulnerability Exploits with Recorded Future

Note: This is just a basic overview providing quick insights into CVE-2015-10132 information. Gain full access to comprehensive CVE data, third party vulnerabilities, compromised credentials and more with Recorded Future
  • Gain complete coverage of your cyber, third party, and physical attack surface
  • Proactively mitigate threats before they turn into costly attacks
  • Make fast, effective, data-driven decisions