fkie_cve-2010-5296
Vulnerability from fkie_nvd
Published
2014-01-21 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://codex.wordpress.org/Version_3.0.2 | Vendor Advisory | |
| cve@mitre.org | https://core.trac.wordpress.org/changeset/15562 | Exploit, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://codex.wordpress.org/Version_3.0.2 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://core.trac.wordpress.org/changeset/15562 | Exploit, Patch |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "741C9E7A-B3B3-4B7B-A588-B75302C71694",
"versionEndIncluding": "3.0.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "55050BF2-A950-45FF-8CD7-7689431AD82A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2C0D45AE-F0FE-4005-80FB-FEFD2DCCE7D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F5663CAA-0859-447E-8489-02CE4315DF91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "480AE325-6DE1-4769-A931-0C6F40D15267",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE23B6C2-354C-47BE-87B9-D4A0A3EE8ADC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FC657077-8955-4CE6-93D8-F78B1BA3A949",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "43FADD00-822C-4BA2-A39F-1459AD786683",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D863DE9E-FD9E-4EA1-9615-02D678813AB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*",
"matchCriteriaId": "3ABD501B-351E-4B4E-9B0B-CF8DCBC72E66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9AA39559-D170-4644-B04D-D6D806B5F33C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "54954434-86BC-403C-949D-E9DA8931FE6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E9A88E6C-BE39-4668-BD0F-EBDBA41010F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*",
"matchCriteriaId": "EA7BF77C-68A1-421B-A446-6206354CA7FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "EF45B5A6-0D49-494F-98A0-CCCBB0CBB882",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AB874C78-3F05-4053-A685-40DE7055359C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6BC0FFB2-58E1-47D2-ACB0-9102D4E09675",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "654F2F75-42D4-4D7A-A8B8-F1C580ABDCA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A684588-4D37-4817-9A1A-BF2E70EC8F7B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action."
},
{
"lang": "es",
"value": "wp-includes/capabilities.php en WordPress anterior a la versi\u00f3n 3.0.2, cuando se usa una configuraci\u00f3n Multisite, no requiere el rol Super Admin para la capacidad delete_users, lo que permite a administradores remotos autenticados evadir restricciones de acceso intencionadas a trav\u00e9s de una acci\u00f3n de eliminaci\u00f3n."
}
],
"id": "CVE-2010-5296",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-01-21T01:55:03.263",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://codex.wordpress.org/Version_3.0.2"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "https://core.trac.wordpress.org/changeset/15562"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://codex.wordpress.org/Version_3.0.2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "https://core.trac.wordpress.org/changeset/15562"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-264"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…