Vulnerabilites related to simplerealtytheme - advanced_text_widget_plugin
CVE-2011-4618 (GCVE-0-2011-4618)
Vulnerability from cvelistv5
Published
2013-01-24 01:00
Modified
2024-08-07 00:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.
References
▼ | URL | Tags |
---|---|---|
http://plugins.trac.wordpress.org/changeset?reponame=&new=466102%40advanced-text-widget&old=465828%40advanced-text-widget | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/71412 | vdb-entry, x_refsource_XF | |
http://www.openwall.com/lists/oss-security/2011/12/19/6 | mailing-list, x_refsource_MLIST | |
http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/50744 | vdb-entry, x_refsource_BID | |
http://www.securityfocus.com/archive/1/520589 | mailing-list, x_refsource_BUGTRAQ | |
http://wordpress.org/extend/plugins/advanced-text-widget/changelog/ | x_refsource_CONFIRM | |
http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:09:19.399Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=466102%40advanced-text-widget\u0026old=465828%40advanced-text-widget" }, { "name": "advancedtextwidget-advancedtext-xss(71412)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71412" }, { "name": "[oss-security] 20111219 Re: CVE-request: WordPress advanced-text-widget XSS advancedtext.php?page=", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/12/19/6" }, { "name": "20120417 Re: Wordpress advanced-text-widget Plugin Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html" }, { "name": "50744", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/50744" }, { "name": "20111121 Wordpress advanced-text-widget Plugin Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/520589" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wordpress.org/extend/plugins/advanced-text-widget/changelog/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-11-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=466102%40advanced-text-widget\u0026old=465828%40advanced-text-widget" }, { "name": "advancedtextwidget-advancedtext-xss(71412)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71412" }, { "name": "[oss-security] 20111219 Re: CVE-request: WordPress advanced-text-widget XSS advancedtext.php?page=", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/12/19/6" }, { "name": "20120417 Re: Wordpress advanced-text-widget Plugin Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html" }, { "name": "50744", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/50744" }, { "name": "20111121 Wordpress advanced-text-widget Plugin Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/520589" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wordpress.org/extend/plugins/advanced-text-widget/changelog/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-4618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=466102@advanced-text-widget\u0026old=465828@advanced-text-widget", "refsource": "CONFIRM", "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=466102@advanced-text-widget\u0026old=465828@advanced-text-widget" }, { "name": "advancedtextwidget-advancedtext-xss(71412)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71412" }, { "name": "[oss-security] 20111219 Re: CVE-request: WordPress advanced-text-widget XSS advancedtext.php?page=", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2011/12/19/6" }, { "name": "20120417 Re: Wordpress advanced-text-widget Plugin Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html" }, { "name": "50744", "refsource": "BID", "url": "http://www.securityfocus.com/bid/50744" }, { "name": "20111121 Wordpress advanced-text-widget Plugin Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/520589" }, { "name": "http://wordpress.org/extend/plugins/advanced-text-widget/changelog/", "refsource": "CONFIRM", "url": "http://wordpress.org/extend/plugins/advanced-text-widget/changelog/" }, { "name": "http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities", "refsource": "MISC", "url": "http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-4618", "datePublished": "2013-01-24T01:00:00", "dateReserved": "2011-11-29T00:00:00", "dateUpdated": "2024-08-07T00:09:19.399Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-01-24 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
simplerealtytheme | advanced_text_widget_plugin | * | |
wordpress | wordpress | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:simplerealtytheme:advanced_text_widget_plugin:*:*:*:*:*:*:*:*", "matchCriteriaId": "79D769FB-995C-4505-BE66-05631AC93904", "versionEndIncluding": "2.0.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter." }, { "lang": "es", "value": "Vulnerabilidad Cross-site scripting (XSS) en advancedtext.php en el plugin Advanced Text Widget anterior a v2.0.2 para WordPress permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro \"page\"." } ], "id": "CVE-2011-4618", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-01-24T01:55:02.003", "references": [ { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html" }, { "source": "secalert@redhat.com", "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=466102%40advanced-text-widget\u0026old=465828%40advanced-text-widget" }, { "source": "secalert@redhat.com", "url": "http://wordpress.org/extend/plugins/advanced-text-widget/changelog/" }, { "source": "secalert@redhat.com", "url": "http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/12/19/6" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/520589" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/50744" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71412" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2012-04/0119.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=466102%40advanced-text-widget\u0026old=465828%40advanced-text-widget" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wordpress.org/extend/plugins/advanced-text-widget/changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wordpress.org/support/topic/wordpress-advanced-text-widget-plugin-cross-site-scripting-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/12/19/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/archive/1/520589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/50744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71412" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }