Lucene search

K
cvelistPatchstackCVELIST:CVE-2023-46624
HistoryDec 19, 2023 - 9:38 p.m.

CVE-2023-46624 WordPress Parcel Pro Plugin <= 1.6.11 is vulnerable to Open Redirection

2023-12-1921:38:07
CWE-601
Patchstack
www.cve.org
1
wordpress
parcel pro
open redirection

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

URL Redirection to Untrusted Site (β€˜Open Redirect’) vulnerability in Parcel Pro.This issue affects Parcel Pro: from n/a through 1.6.11.

CNA Affected

[
  {
    "collectionURL": "https://wordpress.org/plugins",
    "defaultStatus": "unaffected",
    "packageName": "woo-parcel-pro",
    "product": "Parcel Pro",
    "vendor": "Parcel Pro",
    "versions": [
      {
        "changes": [
          {
            "at": "1.6.12",
            "status": "unaffected"
          }
        ],
        "lessThanOrEqual": "1.6.11",
        "status": "affected",
        "version": "n/a",
        "versionType": "custom"
      }
    ]
  }
]

4.7 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N

0.0005 Low

EPSS

Percentile

17.1%

Related for CVELIST:CVE-2023-46624