Vulnerabilites related to moxiecode - plupload
CVE-2012-2401 (GCVE-0-2012-2401)
Vulnerability from cvelistv5
Published
2012-04-21 23:00
Modified
2024-08-06 19:34
Severity ?
CWE
  • n/a
Summary
Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T19:34:24.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "81461",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/81461"
          },
          {
            "name": "49138",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49138"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487"
          },
          {
            "name": "wordpress-plupload-sec-bypass(75208)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208"
          },
          {
            "name": "DSA-2470",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2470"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487"
          },
          {
            "name": "53192",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/53192"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "81461",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/81461"
        },
        {
          "name": "49138",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49138"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487"
        },
        {
          "name": "wordpress-plupload-sec-bypass(75208)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208"
        },
        {
          "name": "DSA-2470",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2470"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487"
        },
        {
          "name": "53192",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/53192"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2012-2401",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "81461",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/81461"
            },
            {
              "name": "49138",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/49138"
            },
            {
              "name": "http://www.plupload.com/punbb/viewtopic.php?id=1685",
              "refsource": "CONFIRM",
              "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685"
            },
            {
              "name": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487",
              "refsource": "CONFIRM",
              "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487"
            },
            {
              "name": "wordpress-plupload-sec-bypass(75208)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208"
            },
            {
              "name": "DSA-2470",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2470"
            },
            {
              "name": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/",
              "refsource": "MISC",
              "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/"
            },
            {
              "name": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487",
              "refsource": "CONFIRM",
              "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487"
            },
            {
              "name": "53192",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/53192"
            },
            {
              "name": "http://wordpress.org/news/2012/04/wordpress-3-3-2/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2012-2401",
    "datePublished": "2012-04-21T23:00:00",
    "dateReserved": "2012-04-21T00:00:00",
    "dateUpdated": "2024-08-06T19:34:24.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2013-0237 (GCVE-0-2013-0237)
Vulnerability from cvelistv5
Published
2013-07-08 20:00
Modified
2024-09-16 22:21
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:18:09.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://codex.wordpress.org/Version_3.5.1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-07-08T20:00:00Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://codex.wordpress.org/Version_3.5.1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2013-0237",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=904122",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122"
            },
            {
              "name": "http://codex.wordpress.org/Version_3.5.1",
              "refsource": "CONFIRM",
              "url": "http://codex.wordpress.org/Version_3.5.1"
            },
            {
              "name": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5",
              "refsource": "CONFIRM",
              "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5"
            },
            {
              "name": "http://wordpress.org/news/2013/01/wordpress-3-5-1/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-0237",
    "datePublished": "2013-07-08T20:00:00Z",
    "dateReserved": "2012-12-06T00:00:00Z",
    "dateUpdated": "2024-09-16T22:21:09.232Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2013-07-08 20:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.
Impacted products
Vendor Product Version
moxiecode plupload *
moxiecode plupload 1.4.0
moxiecode plupload 1.4.1
moxiecode plupload 1.4.2
moxiecode plupload 1.4.3
moxiecode plupload 1.5.0
moxiecode plupload 1.5.0
moxiecode plupload 1.5.1
moxiecode plupload 1.5.2
moxiecode plupload 1.5.3
wordpress wordpress *
wordpress wordpress 0.71
wordpress wordpress 1.0
wordpress wordpress 1.0.1
wordpress wordpress 1.0.2
wordpress wordpress 1.1.1
wordpress wordpress 1.2
wordpress wordpress 1.2.1
wordpress wordpress 1.2.2
wordpress wordpress 1.2.3
wordpress wordpress 1.2.4
wordpress wordpress 1.2.5
wordpress wordpress 1.2.5
wordpress wordpress 1.3
wordpress wordpress 1.3.2
wordpress wordpress 1.3.3
wordpress wordpress 1.5
wordpress wordpress 1.5.1
wordpress wordpress 1.5.1.1
wordpress wordpress 1.5.1.2
wordpress wordpress 1.5.1.3
wordpress wordpress 1.5.2
wordpress wordpress 1.6.2
wordpress wordpress 2.0
wordpress wordpress 2.0.1
wordpress wordpress 2.0.2
wordpress wordpress 2.0.4
wordpress wordpress 2.0.5
wordpress wordpress 2.0.6
wordpress wordpress 2.0.7
wordpress wordpress 2.0.8
wordpress wordpress 2.0.9
wordpress wordpress 2.0.10
wordpress wordpress 2.0.11
wordpress wordpress 2.1
wordpress wordpress 2.1.1
wordpress wordpress 2.1.2
wordpress wordpress 2.1.3
wordpress wordpress 2.2
wordpress wordpress 2.2.1
wordpress wordpress 2.2.2
wordpress wordpress 2.2.3
wordpress wordpress 2.3
wordpress wordpress 2.3.1
wordpress wordpress 2.3.2
wordpress wordpress 2.3.3
wordpress wordpress 2.5
wordpress wordpress 2.5.1
wordpress wordpress 2.6
wordpress wordpress 2.6.1
wordpress wordpress 2.6.2
wordpress wordpress 2.6.3
wordpress wordpress 2.6.5
wordpress wordpress 2.7
wordpress wordpress 2.7.1
wordpress wordpress 2.8
wordpress wordpress 2.8.1
wordpress wordpress 2.8.2
wordpress wordpress 2.8.3
wordpress wordpress 2.8.4
wordpress wordpress 2.8.4
wordpress wordpress 2.8.5
wordpress wordpress 2.8.5.1
wordpress wordpress 2.8.5.2
wordpress wordpress 2.8.6
wordpress wordpress 2.9
wordpress wordpress 2.9.1
wordpress wordpress 2.9.1.1
wordpress wordpress 2.9.2
wordpress wordpress 3.3
wordpress wordpress 3.3.1
wordpress wordpress 3.3.2
wordpress wordpress 3.3.3
wordpress wordpress 3.4.0
wordpress wordpress 3.4.1
wordpress wordpress 3.4.2
fedoraproject fedora 16
fedoraproject fedora 17
fedoraproject fedora 18



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F99688-8418-40E2-8D97-58C43A241B00",
              "versionEndIncluding": "1.5.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80A4CDE5-D989-4BA2-9B02-C3F6900D0F04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "332F80E5-9707-4BEB-B859-332109CA69E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E83D34-E881-47A2-8EFD-18C044936CB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "322FB6FF-ED26-4648-B475-52604E3D85C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B3D597-63EE-4B1F-92F5-63A518EC3874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CECC5B6D-468D-4FF8-AB7A-8CA5D66DE0B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04474A6-B7D4-430C-B987-B5C55D7AB802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "85123D28-861A-4B4F-81F5-3437CBE5B616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2F63FFC-3D67-487F-8B1E-1FD7682FC5D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2876C499-7085-4495-96DC-78323B518164",
              "versionEndIncluding": "3.5.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8B664FF-DF43-45C3-A42D-1FCD42A597B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F19F56-9338-4917-B782-AA70BF1511EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B70AE-3C27-4AD0-869C-E219728A8D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C3BA98-8CF0-4440-BE46-27FC0E20BC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*",
              "matchCriteriaId": "0D437FE7-78EA-4264-BF16-1B5757AC6AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53347E6-D721-4E47-BE5B-FA927B9DB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C97B7C-77F4-4020-8574-E853CE5CD885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47496E3-BB07-45E6-ACCA-84D5EF499E21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AA51B49-8E36-48BC-A660-F155D6A4E166",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55050BF2-A950-45FF-8CD7-7689431AD82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0D45AE-F0FE-4005-80FB-FEFD2DCCE7D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5663CAA-0859-447E-8489-02CE4315DF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "480AE325-6DE1-4769-A931-0C6F40D15267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE23B6C2-354C-47BE-87B9-D4A0A3EE8ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC657077-8955-4CE6-93D8-F78B1BA3A949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FADD00-822C-4BA2-A39F-1459AD786683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D863DE9E-FD9E-4EA1-9615-02D678813AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
              "matchCriteriaId": "3ABD501B-351E-4B4E-9B0B-CF8DCBC72E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA39559-D170-4644-B04D-D6D806B5F33C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "54954434-86BC-403C-949D-E9DA8931FE6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9A88E6C-BE39-4668-BD0F-EBDBA41010F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7BF77C-68A1-421B-A446-6206354CA7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF45B5A6-0D49-494F-98A0-CCCBB0CBB882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB874C78-3F05-4053-A685-40DE7055359C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC0FFB2-58E1-47D2-ACB0-9102D4E09675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "654F2F75-42D4-4D7A-A8B8-F1C580ABDCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "648439C2-2459-4AB3-9E9A-B63F5030A4AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "13CF5422-62D0-4777-AA94-5C166AEA4AA4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "19420CF9-1B33-422F-8D47-A8FE58F84944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6EA8986-0845-4F67-9429-C6DAA0006C85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FE29FD-889A-449D-BD1F-648F06D81F5A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F6C04D0-05E9-41C8-B15B-A3A0DBFE0E9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3631CE91-D41D-4758-B3D2-3950BC0E2455",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:16:*:*:*:*:*:*:*",
              "matchCriteriaId": "706C6399-CAD1-46E3-87A2-8DFE2CF497ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:17:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA9D861-3EAF-42F5-B0B6-A4CD7BDD6188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:18:*:*:*:*:*:*:*",
              "matchCriteriaId": "E14271AE-1309-48F3-B9C6-D7DEEC488279",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados en Plupload.as en Moxiecode Plupload anteriores a v1.5.5, como el usado en WordPress anteriores a v3.5.1 y otros productos, permiten a atacantes remotos inyectar comandos web o HTML a trav\u00e9s del par\u00e1metro id."
    }
  ],
  "id": "CVE-2013-0237",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2013-07-08T20:55:00.993",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://codex.wordpress.org/Version_3.5.1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://codex.wordpress.org/Version_3.5.1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/news/2013/01/wordpress-3-5-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=904122"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://github.com/moxiecode/plupload/commit/2d746ee9083c184f1234d8fed311e89bdd1b39e5"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-04-21 23:55
Modified
2025-04-11 00:51
Severity ?
Summary
Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content.
References
cve@mitre.orghttp://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487
cve@mitre.orghttp://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487
cve@mitre.orghttp://osvdb.org/81461
cve@mitre.orghttp://secunia.com/advisories/49138Vendor Advisory
cve@mitre.orghttp://wordpress.org/news/2012/04/wordpress-3-3-2/Patch, Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2012/dsa-2470
cve@mitre.orghttp://www.plupload.com/punbb/viewtopic.php?id=1685
cve@mitre.orghttp://www.securityfocus.com/bid/53192
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/75208
cve@mitre.orghttps://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/
af854a3a-2127-422b-91ae-364da2661108http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487
af854a3a-2127-422b-91ae-364da2661108http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/81461
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49138Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://wordpress.org/news/2012/04/wordpress-3-3-2/Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2470
af854a3a-2127-422b-91ae-364da2661108http://www.plupload.com/punbb/viewtopic.php?id=1685
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/53192
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/75208
af854a3a-2127-422b-91ae-364da2661108https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/
Impacted products
Vendor Product Version
moxiecode plupload *
moxiecode plupload 1.4.0
moxiecode plupload 1.4.1
moxiecode plupload 1.4.2
moxiecode plupload 1.4.3
moxiecode plupload 1.5.0
moxiecode plupload 1.5.0
moxiecode plupload 1.5.1
moxiecode plupload 1.5.2
wordpress wordpress *
wordpress wordpress 0.71
wordpress wordpress 1.0
wordpress wordpress 1.0.1
wordpress wordpress 1.0.2
wordpress wordpress 1.1.1
wordpress wordpress 1.2
wordpress wordpress 1.2.1
wordpress wordpress 1.2.2
wordpress wordpress 1.2.3
wordpress wordpress 1.2.4
wordpress wordpress 1.2.5
wordpress wordpress 1.2.5
wordpress wordpress 1.3
wordpress wordpress 1.3.2
wordpress wordpress 1.3.3
wordpress wordpress 1.5
wordpress wordpress 1.5.1
wordpress wordpress 1.5.1.1
wordpress wordpress 1.5.1.2
wordpress wordpress 1.5.1.3
wordpress wordpress 1.5.2
wordpress wordpress 2.0
wordpress wordpress 2.0.1
wordpress wordpress 2.0.2
wordpress wordpress 2.0.4
wordpress wordpress 2.0.5
wordpress wordpress 2.0.6
wordpress wordpress 2.0.7
wordpress wordpress 2.0.8
wordpress wordpress 2.0.9
wordpress wordpress 2.0.10
wordpress wordpress 2.0.11
wordpress wordpress 2.1
wordpress wordpress 2.1.1
wordpress wordpress 2.1.2
wordpress wordpress 2.1.3
wordpress wordpress 2.2
wordpress wordpress 2.2.1
wordpress wordpress 2.2.2
wordpress wordpress 2.2.3
wordpress wordpress 2.3
wordpress wordpress 2.3.1
wordpress wordpress 2.3.2
wordpress wordpress 2.3.3
wordpress wordpress 2.5
wordpress wordpress 2.5.1
wordpress wordpress 2.6
wordpress wordpress 2.6.1
wordpress wordpress 2.6.2
wordpress wordpress 2.6.3
wordpress wordpress 2.6.5
wordpress wordpress 2.7
wordpress wordpress 2.7.1
wordpress wordpress 2.8
wordpress wordpress 2.8.1
wordpress wordpress 2.8.2
wordpress wordpress 2.8.3
wordpress wordpress 2.8.4
wordpress wordpress 2.8.4
wordpress wordpress 2.8.5
wordpress wordpress 2.8.5.1
wordpress wordpress 2.8.5.2
wordpress wordpress 2.8.6
wordpress wordpress 2.9
wordpress wordpress 2.9.1
wordpress wordpress 2.9.1.1
wordpress wordpress 2.9.2
wordpress wordpress 3.0
wordpress wordpress 3.0.1
wordpress wordpress 3.0.2
wordpress wordpress 3.0.3
wordpress wordpress 3.0.4
wordpress wordpress 3.0.5
wordpress wordpress 3.0.6
wordpress wordpress 3.1
wordpress wordpress 3.1.1
wordpress wordpress 3.1.2
wordpress wordpress 3.1.3
wordpress wordpress 3.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7C31E9-B3DB-48DC-B1AB-8E2D5C164C8C",
              "versionEndIncluding": "1.5.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "80A4CDE5-D989-4BA2-9B02-C3F6900D0F04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "332F80E5-9707-4BEB-B859-332109CA69E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70E83D34-E881-47A2-8EFD-18C044936CB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "322FB6FF-ED26-4648-B475-52604E3D85C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62B3D597-63EE-4B1F-92F5-63A518EC3874",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CECC5B6D-468D-4FF8-AB7A-8CA5D66DE0B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04474A6-B7D4-430C-B987-B5C55D7AB802",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:moxiecode:plupload:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "85123D28-861A-4B4F-81F5-3437CBE5B616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C05410D-70B2-405A-9D11-3614114220A3",
              "versionEndIncluding": "3.3.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8B664FF-DF43-45C3-A42D-1FCD42A597B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F19F56-9338-4917-B782-AA70BF1511EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B83B70AE-3C27-4AD0-869C-E219728A8D92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "62C3BA98-8CF0-4440-BE46-27FC0E20BC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*",
              "matchCriteriaId": "0D437FE7-78EA-4264-BF16-1B5757AC6AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A53347E6-D721-4E47-BE5B-FA927B9DB164",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C97B7C-77F4-4020-8574-E853CE5CD885",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B47496E3-BB07-45E6-ACCA-84D5EF499E21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55050BF2-A950-45FF-8CD7-7689431AD82A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C0D45AE-F0FE-4005-80FB-FEFD2DCCE7D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5663CAA-0859-447E-8489-02CE4315DF91",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "480AE325-6DE1-4769-A931-0C6F40D15267",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE23B6C2-354C-47BE-87B9-D4A0A3EE8ADC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC657077-8955-4CE6-93D8-F78B1BA3A949",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "43FADD00-822C-4BA2-A39F-1459AD786683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "D863DE9E-FD9E-4EA1-9615-02D678813AB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
              "matchCriteriaId": "3ABD501B-351E-4B4E-9B0B-CF8DCBC72E66",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AA39559-D170-4644-B04D-D6D806B5F33C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "54954434-86BC-403C-949D-E9DA8931FE6E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9A88E6C-BE39-4668-BD0F-EBDBA41010F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA7BF77C-68A1-421B-A446-6206354CA7FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF45B5A6-0D49-494F-98A0-CCCBB0CBB882",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB874C78-3F05-4053-A685-40DE7055359C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC0FFB2-58E1-47D2-ACB0-9102D4E09675",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "654F2F75-42D4-4D7A-A8B8-F1C580ABDCA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A684588-4D37-4817-9A1A-BF2E70EC8F7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "05D3E145-ECF8-4BAD-9471-4E4605887B18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "525887EE-50DB-4739-8897-A0D19D486CE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DC19614-2A59-4A49-B824-35975502B38F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2DDB9C-E1D7-4DBD-A27C-93C9A9C0B7E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "832F89CB-595B-407A-A27C-F655F7112830",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "89977E0E-694C-49FA-814D-D356EC9294C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D1E83C-39AC-4E3D-874A-AF0F16ADDE41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "65FD149E-8CF4-46FE-9F5E-9DEE61B4164C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D23F1397-7262-4B61-8061-83C2ED731DB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C85D16FE-BB31-4866-8F85-22F1C0F1131D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "648439C2-2459-4AB3-9E9A-B63F5030A4AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Plupload before 1.5.4, as used in wp-includes/js/plupload/ in WordPress before 3.3.2 and other products, enables scripting regardless of the domain from which the SWF content was loaded, which allows remote attackers to bypass the Same Origin Policy via crafted content."
    },
    {
      "lang": "es",
      "value": "Plupload antes de v1.5.4, tal y como se utiliza en wp-includes/js/plupload/ en WordPress antes de v3.3.2 y otros productos, permite ejecutar secuencias de comandos, independientemente del dominio desde el que se carg\u00f3 el contenido SWF, lo que permite a atacantes remotos evitar la pol\u00edtica de mismo origen a trav\u00e9s de contenido malicioso."
    }
  ],
  "id": "CVE-2012-2401",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-04-21T23:55:01.330",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/81461"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49138"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2012/dsa-2470"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53192"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload/changelog.txt?rev=20487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://core.trac.wordpress.org/browser/branches/3.3/wp-includes/js/plupload?rev=20487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/81461"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49138"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/news/2012/04/wordpress-3-3-2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2470"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.plupload.com/punbb/viewtopic.php?id=1685"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53192"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/75208"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://nealpoole.com/blog/2012/05/xss-and-csrf-via-swf-applets-swfupload-plupload/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}