Vulnerabilites related to moxiecode - plupload
CVE-2012-2401 (GCVE-0-2012-2401)
Vulnerability from cvelistv5
Published
2012-04-21 23:00
Modified
2024-08-06 19:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/81461 | vdb-entry, x_refsource_OSVDB | |
http://secunia.com/advisories/49138 | third-party-advisory, x_refsource_SECUNIA | |
http://www.plupload.com/punbb/viewtopic.php?id=1685 | x_refsource_CONFIRM | |
http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/75208 | vdb-entry, x_refsource_XF | |
http://www.debian.org/security/2012/dsa-2470 | vendor-advisory, x_refsource_DEBIAN | |
https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/ | x_refsource_MISC | |
http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/53192 | vdb-entry, x_refsource_BID | |
http://wordpress.org/news/2012/04/wordpress-3-3-2/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T19:34:24.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "81461", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/81461" }, { "name": "49138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49138" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487" }, { "name": "wordpress-plupload-sec-bypass(75208)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208" }, { "name": "DSA-2470", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2012/dsa-2470" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487" }, { "name": "53192", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/53192" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-04-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "81461", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/81461" }, { "name": "49138", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49138" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487" }, { "name": "wordpress-plupload-sec-bypass(75208)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208" }, { "name": "DSA-2470", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2012/dsa-2470" }, { "tags": [ "x_refsource_MISC" ], "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487" }, { "name": "53192", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/53192" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-2401", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "81461", "refsource": "OSVDB", "url": "http://osvdb.org/81461" }, { "name": "49138", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49138" }, { "name": "http://www.plupload.com/punbb/viewtopic.php?id=1685", "refsource": "CONFIRM", "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685" }, { "name": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487", "refsource": "CONFIRM", "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487" }, { "name": "wordpress-plupload-sec-bypass(75208)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208" }, { "name": "DSA-2470", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2012/dsa-2470" }, { "name": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/", "refsource": "MISC", "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/" }, { "name": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487", "refsource": "CONFIRM", "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487" }, { "name": "53192", "refsource": "BID", "url": "http://www.securityfocus.com/bid/53192" }, { "name": "http://wordpress.org/news/2012/04/wordpress-3-3-2/", "refsource": "CONFIRM", "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2012-2401", "datePublished": "2012-04-21T23:00:00", "dateReserved": "2012-04-21T00:00:00", "dateUpdated": "2024-08-06T19:34:24.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2013-0237 (GCVE-0-2013-0237)
Vulnerability from cvelistv5
Published
2013-07-08 20:00
Modified
2024-09-16 22:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=904122 | x_refsource_CONFIRM | |
http://codex.wordpress.org/Version_3.5.1 | x_refsource_CONFIRM | |
https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5 | x_refsource_CONFIRM | |
http://wordpress.org/news/2013/01/wordpress-3-5-1/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T14:18:09.586Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://codex.wordpress.org/Version_3.5.1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-07-08T20:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://codex.wordpress.org/Version_3.5.1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-0237", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=904122", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122" }, { "name": "http://codex.wordpress.org/Version_3.5.1", "refsource": "CONFIRM", "url": "http://codex.wordpress.org/Version_3.5.1" }, { "name": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5", "refsource": "CONFIRM", "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5" }, { "name": "http://wordpress.org/news/2013/01/wordpress-3-5-1/", "refsource": "CONFIRM", "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2013-0237", "datePublished": "2013-07-08T20:00:00Z", "dateReserved": "2012-12-06T00:00:00Z", "dateUpdated": "2024-09-16T22:21:09.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2013-07-08 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4F99688-8418-40E2-8D97-58C43A241B00", "versionEndIncluding": "1.5.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A4CDE5-D989-4BA2-9B02-C3F6900D0F04", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "332F80E5-9707-4BEB-B859-332109CA69E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "70E83D34-E881-47A2-8EFD-18C044936CB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "322FB6FF-ED26-4648-B475-52604E3D85C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "62B3D597-63EE-4B1F-92F5-63A518EC3874", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*", "matchCriteriaId": "CECC5B6D-468D-4FF8-AB7A-8CA5D66DE0B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F04474A6-B7D4-430C-B987-B5C55D7AB802", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "85123D28-861A-4B4F-81F5-3437CBE5B616", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "C2F63FFC-3D67-487F-8B1E-1FD7682FC5D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "2876C499-7085-4495-96DC-78323B518164", "versionEndIncluding": "3.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8B664FF-DF43-45C3-A42D-1FCD42A597B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "59F19F56-9338-4917-B782-AA70BF1511EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B83B70AE-3C27-4AD0-869C-E219728A8D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "62C3BA98-8CF0-4440-BE46-27FC0E20BC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*", "matchCriteriaId": "0D437FE7-78EA-4264-BF16-1B5757AC6AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A53347E6-D721-4E47-BE5B-FA927B9DB164", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C97B7C-77F4-4020-8574-E853CE5CD885", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B47496E3-BB07-45E6-ACCA-84D5EF499E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "4AA51B49-8E36-48BC-A660-F155D6A4E166", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "55050BF2-A950-45FF-8CD7-7689431AD82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2C0D45AE-F0FE-4005-80FB-FEFD2DCCE7D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5663CAA-0859-447E-8489-02CE4315DF91", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "480AE325-6DE1-4769-A931-0C6F40D15267", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE23B6C2-354C-47BE-87B9-D4A0A3EE8ADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC657077-8955-4CE6-93D8-F78B1BA3A949", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "43FADD00-822C-4BA2-A39F-1459AD786683", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "D863DE9E-FD9E-4EA1-9615-02D678813AB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*", "matchCriteriaId": "3ABD501B-351E-4B4E-9B0B-CF8DCBC72E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AA39559-D170-4644-B04D-D6D806B5F33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "54954434-86BC-403C-949D-E9DA8931FE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9A88E6C-BE39-4668-BD0F-EBDBA41010F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "EA7BF77C-68A1-421B-A446-6206354CA7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "EF45B5A6-0D49-494F-98A0-CCCBB0CBB882", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB874C78-3F05-4053-A685-40DE7055359C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BC0FFB2-58E1-47D2-ACB0-9102D4E09675", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "654F2F75-42D4-4D7A-A8B8-F1C580ABDCA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "648439C2-2459-4AB3-9E9A-B63F5030A4AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "13CF5422-62D0-4777-AA94-5C166AEA4AA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "19420CF9-1B33-422F-8D47-A8FE58F84944", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "C6EA8986-0845-4F67-9429-C6DAA0006C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "F7FE29FD-889A-449D-BD1F-648F06D81F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "1F6C04D0-05E9-41C8-B15B-A3A0DBFE0E9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "3631CE91-D41D-4758-B3D2-3950BC0E2455", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*", "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*", "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*", "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en Plupload.as en Moxiecode Plupload anteriores a v1.5.5, como el usado en WordPress anteriores a v3.5.1 y otros productos, permiten a atacantes remotos inyectar comandos web o HTML a trav\u00e9s del par\u00e1metro id." } ], "id": "CVE-2013-0237", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-07-08T20:55:00.993", "references": [ { "source": "secalert@redhat.com", "url": "http://codex.wordpress.org/Version_3.5.1" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://codex.wordpress.org/Version_3.5.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-04-21 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*", "matchCriteriaId": "AB7C31E9-B3DB-48DC-B1AB-8E2D5C164C8C", "versionEndIncluding": "1.5.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "80A4CDE5-D989-4BA2-9B02-C3F6900D0F04", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "332F80E5-9707-4BEB-B859-332109CA69E1", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "70E83D34-E881-47A2-8EFD-18C044936CB6", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "322FB6FF-ED26-4648-B475-52604E3D85C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "62B3D597-63EE-4B1F-92F5-63A518EC3874", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*", "matchCriteriaId": "CECC5B6D-468D-4FF8-AB7A-8CA5D66DE0B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "F04474A6-B7D4-430C-B987-B5C55D7AB802", "vulnerable": true }, { "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "85123D28-861A-4B4F-81F5-3437CBE5B616", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "4C05410D-70B2-405A-9D11-3614114220A3", "versionEndIncluding": "3.3.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "C8B664FF-DF43-45C3-A42D-1FCD42A597B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "59F19F56-9338-4917-B782-AA70BF1511EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B83B70AE-3C27-4AD0-869C-E219728A8D92", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "62C3BA98-8CF0-4440-BE46-27FC0E20BC38", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*", "matchCriteriaId": "0D437FE7-78EA-4264-BF16-1B5757AC6AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A53347E6-D721-4E47-BE5B-FA927B9DB164", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "C2C97B7C-77F4-4020-8574-E853CE5CD885", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "B47496E3-BB07-45E6-ACCA-84D5EF499E21", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*", "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*", "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "55050BF2-A950-45FF-8CD7-7689431AD82A", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*", "matchCriteriaId": "2C0D45AE-F0FE-4005-80FB-FEFD2DCCE7D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "F5663CAA-0859-447E-8489-02CE4315DF91", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*", "matchCriteriaId": "480AE325-6DE1-4769-A931-0C6F40D15267", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE23B6C2-354C-47BE-87B9-D4A0A3EE8ADC", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "FC657077-8955-4CE6-93D8-F78B1BA3A949", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "43FADD00-822C-4BA2-A39F-1459AD786683", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "D863DE9E-FD9E-4EA1-9615-02D678813AB9", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*", "matchCriteriaId": "3ABD501B-351E-4B4E-9B0B-CF8DCBC72E66", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "9AA39559-D170-4644-B04D-D6D806B5F33C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "54954434-86BC-403C-949D-E9DA8931FE6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "E9A88E6C-BE39-4668-BD0F-EBDBA41010F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "EA7BF77C-68A1-421B-A446-6206354CA7FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*", "matchCriteriaId": "EF45B5A6-0D49-494F-98A0-CCCBB0CBB882", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "AB874C78-3F05-4053-A685-40DE7055359C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "6BC0FFB2-58E1-47D2-ACB0-9102D4E09675", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "654F2F75-42D4-4D7A-A8B8-F1C580ABDCA5", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "5A684588-4D37-4817-9A1A-BF2E70EC8F7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "05D3E145-ECF8-4BAD-9471-4E4605887B18", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "525887EE-50DB-4739-8897-A0D19D486CE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9DC19614-2A59-4A49-B824-35975502B38F", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "8E2DDB9C-E1D7-4DBD-A27C-93C9A9C0B7E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "832F89CB-595B-407A-A27C-F655F7112830", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "89977E0E-694C-49FA-814D-D356EC9294C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "88D1E83C-39AC-4E3D-874A-AF0F16ADDE41", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "65FD149E-8CF4-46FE-9F5E-9DEE61B4164C", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D23F1397-7262-4B61-8061-83C2ED731DB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "C85D16FE-BB31-4866-8F85-22F1C0F1131D", "vulnerable": true }, { "criteria": "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "648439C2-2459-4AB3-9E9A-B63F5030A4AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content." }, { "lang": "es", "value": "Plupload antes de v1.5.4, tal y como se utiliza en wp-includes/js/plupload/ en WordPress antes de v3.3.2 y otros productos, permite ejecutar secuencias de comandos, independientemente del dominio desde el que se carg\u00f3 el contenido SWF, lo que permite a atacantes remotos evitar la pol\u00edtica de mismo origen a trav\u00e9s de contenido malicioso." } ], "id": "CVE-2012-2401", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-04-21T23:55:01.330", "references": [ { "source": "cve@mitre.org", "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487" }, { "source": "cve@mitre.org", "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/81461" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49138" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2012/dsa-2470" }, { "source": "cve@mitre.org", "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/53192" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208" }, { "source": "cve@mitre.org", "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/81461" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/49138" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2470" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/53192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }