Vulnerabilites related to fusedpress - buddypress-extended-frienship-request
CVE-2013-4944 (GCVE-0-2013-4944)
Vulnerability from cvelistv5
Published
2013-07-29 21:00
Modified
2024-08-06 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/85416 | vdb-entry, x_refsource_XF | |
http://secunia.com/advisories/54048 | third-party-advisory, x_refsource_SECUNIA | |
http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/ | x_refsource_CONFIRM | |
http://osvdb.org/94807 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:59:40.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "buddypressextfriendshipreq-adminajax-xss(85416)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85416" }, { "name": "54048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/54048" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/" }, { "name": "94807", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/94807" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-07-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the \"Friend Connections\" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "buddypressextfriendshipreq-adminajax-xss(85416)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85416" }, { "name": "54048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/54048" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/" }, { "name": "94807", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/94807" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-4944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the \"Friend Connections\" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "buddypressextfriendshipreq-adminajax-xss(85416)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85416" }, { "name": "54048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/54048" }, { "name": "http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/", "refsource": "CONFIRM", "url": "http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/" }, { "name": "94807", "refsource": "OSVDB", "url": "http://osvdb.org/94807" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-4944", "datePublished": "2013-07-29T21:00:00", "dateReserved": "2013-07-29T00:00:00", "dateUpdated": "2024-08-06T16:59:40.915Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-07-29 23:27
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fusedpress | buddypress-extended-frienship-request | * | |
fusedpress | buddypress-extended-frienship-request | 1.0 | |
wordpress | wordpress | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fusedpress:buddypress-extended-frienship-request:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C0BAEC9-2FB9-4460-A8DF-AB6A83F7F73A", "versionEndIncluding": "1.0.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:fusedpress:buddypress-extended-frienship-request:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "34D2B217-09A6-4BBF-AEF4-B8205920BD41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the \"Friend Connections\" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information." }, { "lang": "es", "value": "Vulnerabilidad XSS en el plugin BuddyPress Extended Friendship Request anterior a 1.0.2 para WordPress, cuando el componente \"Friend Connections\" est\u00e1 activado, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro friendship_request_message a wp-admin/admin-ajax.php. NOTA: algunos de estos detalles han sido obtenidos a partir de informaci\u00f3n de terceros." } ], "id": "CVE-2013-4944", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-07-29T23:27:38.633", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/94807" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54048" }, { "source": "cve@mitre.org", "url": "http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85416" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/94807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/54048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wordpress.org/plugins/buddypress-extended-friendship-request/changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/85416" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }