CVE-2014-125092
low-risk
Published 2023-03-05
A vulnerability was found in MaxButtons Plugin up to 1.26.0 on WordPress and classified as problematic. This issue affects the function maxbuttons_strip_px of the file includes/maxbuttons-button.php. The manipulation of the argument button_id leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 1.26.1 is able to address this issue. The patch is named e74564c9e3b7429808e317f4916bd1c26ef0b806. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222323.
Do I need to act?
-
0.49% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.5/10
Low
NETWORK
/ LOW complexity
Affected Products (1)
Maxbuttons
Affected Vendors
References (8)
Permissions Required
https://vuldb.com/?ctiid.222323
Third Party Advisory
https://vuldb.com/?id.222323
Permissions Required
https://vuldb.com/?ctiid.222323
Third Party Advisory
https://vuldb.com/?id.222323
23
/ 100
low-risk
Severity
16/34 · Moderate
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal