
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2015-10147) affects the Easy Testimonial Slider and Form WordPress plugin versions 1.0.2 and below. It is an authenticated SQL injection vulnerability that requires administrator or higher privileges to exploit. The vulnerability was discovered by Ala Arfaoui and was publicly disclosed on October 28, 2025 (Wordfence Threat Intel).
This is an authenticated SQL injection vulnerability with a CVSS score of 4.9 (Medium severity). The vulnerability requires administrator or higher level privileges to exploit, indicating it is only exploitable by trusted users with significant access to the system (Wordfence Threat Intel).
Given that this vulnerability requires administrator privileges to exploit, the potential impact is somewhat limited since it can only be exploited by users who already have significant access to the system. However, successful exploitation could potentially allow an authenticated administrator to perform unauthorized database operations (Wordfence Threat Intel).
Users should upgrade the Easy Testimonial Slider and Form plugin to a version higher than 1.0.2 to remediate this vulnerability. Additionally, following security best practices such as limiting administrator access and regularly reviewing admin accounts is recommended (WordPress Plugin Directory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."