fkie_cve-2011-4803
Vulnerability from fkie_nvd
Published
2011-12-14 00:55
Modified
2025-04-11 00:51
Severity ?
Summary
SQL injection vulnerability in wptouch/ajax.php in the WPTouch plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "5BFD0DB2-7A64-4698-8DA9-380769BBC25C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "95C6D2F2-FC4A-43EF-96B4-D84B6605471F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7AE81D83-0B96-4C02-B8FC-6E5231314E47", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "F9722E64-6764-4F08-A412-1A7B4BA32A54", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "5A85EF16-7366-453F-B700-1DCCF9AC5912", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9B209A18-07CF-4622-8DB2-36DB7D8F23E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.6:*:*:*:*:*:*:*", "matchCriteriaId": "D19BA277-CD29-43C9-840C-52684D72B12B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "61441A0F-C06C-4E71-91A6-4F9791CE1961", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "B68756EE-828A-429C-8445-02D3D2E8A02A", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "319C88D4-0D4E-4B40-82F1-E28CE164B2AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9:*:*:*:*:*:*:*", "matchCriteriaId": "DA2E855F-E94B-46B3-AFB2-05DBC029F297", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "5490127F-7DB6-4565-B163-28FEC2564532", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D6384EA-0C4C-4157-B246-4E9ACDA7BC76", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "52850683-EB92-46DC-B955-3305D1E90C42", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB08B929-AA93-473F-8383-657B47271C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "D2D942FA-E789-4AF7-B795-741AF0265817", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "74C1017A-2E48-4215-BF3F-E847A6BE6FDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "B0234C49-D383-40F3-8E5A-1666FABF0988", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "AC2C350A-0C8D-46D0-9A2A-9BDEF8F8405E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "A426DE5B-56F5-47B2-A47F-3B8F554D5943", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9:*:*:*:*:*:*:*", "matchCriteriaId": "E2F782D6-9F13-4842-87F6-A6A9BBEF1F15", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "A128B18B-6110-426F-89B8-5A72B1FAEB29", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "5AE5DD1A-9D1E-4923-A015-298B76EF4B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "28A2BE4A-4427-4B62-AB5A-6D3CE95A55C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "0AD2D3D8-6E10-43E8-A9CC-AC3AA782ED66", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.5:*:*:*:*:*:*:*", "matchCriteriaId": "672E59AF-76C9-404A-9DB4-0E247A696454", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.6:*:*:*:*:*:*:*", "matchCriteriaId": "C49BFDCF-E968-4233-87D6-320BE74C263C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.7:*:*:*:*:*:*:*", "matchCriteriaId": "886EF0E0-93AC-46EA-8149-11FC45E8DB46", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.8:*:*:*:*:*:*:*", "matchCriteriaId": "DDEE1523-A5A9-4A7B-8FD1-919D2BF7C24F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.10:*:*:*:*:*:*:*", "matchCriteriaId": "C37834DA-BD73-49AE-9CD2-276AB1003FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.11:*:*:*:*:*:*:*", "matchCriteriaId": "6DB1911C-88E5-4006-879D-D886320E258D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.12:*:*:*:*:*:*:*", "matchCriteriaId": "ED2FDE64-7FC3-4B24-A1F9-6103381E84A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.13:*:*:*:*:*:*:*", "matchCriteriaId": "61935681-AC3B-42F1-9306-4C6F88551590", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.14:*:*:*:*:*:*:*", "matchCriteriaId": "B0E27227-37CA-4F31-8484-38CFC116BEEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.15:*:*:*:*:*:*:*", "matchCriteriaId": "F4019E17-FF95-4B9A-A059-3025E6949217", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.16:*:*:*:*:*:*:*", "matchCriteriaId": "FBDBC2E8-1F9C-487D-BC42-4D7FB1E490B3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.17:*:*:*:*:*:*:*", "matchCriteriaId": "AE4EA9CD-91AC-456E-B193-896A50301392", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.18:*:*:*:*:*:*:*", "matchCriteriaId": "98854719-8862-4320-AC83-7F6AF6438B69", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19:*:*:*:*:*:*:*", "matchCriteriaId": "FA0163E0-AACB-469D-9931-2D6FABCEA605", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF755C9-05A7-46CA-90E5-8112DA01A746", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.2:*:*:*:*:*:*:*", "matchCriteriaId": "28F207FD-F893-45AD-8B36-ACDA9B422A14", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.3:*:*:*:*:*:*:*", "matchCriteriaId": "E24CEE7F-42B9-48BB-A721-2DB3C4B28C98", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.4:*:*:*:*:*:*:*", "matchCriteriaId": "D4D879A2-131B-4331-8F32-6DBD542F89AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.5:*:*:*:*:*:*:*", "matchCriteriaId": "6FC6C5AD-6244-4697-AA82-97601B104B9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.20:*:*:*:*:*:*:*", "matchCriteriaId": "0748FB18-8E4B-4DED-9848-9CA6F1F4BBEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.21:*:*:*:*:*:*:*", "matchCriteriaId": "E04ECB17-A65E-4DB2-9A3B-14CDEA997584", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.21.1:*:*:*:*:*:*:*", "matchCriteriaId": "86F009F6-5722-41BE-B5BD-EDEBCE3A11F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.22:*:*:*:*:*:*:*", "matchCriteriaId": "D57EDD99-DB18-43D5-9C91-EAF4C2509A7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.22.1:*:*:*:*:*:*:*", "matchCriteriaId": "196734D5-651C-487F-98F4-1416BF9CA0E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.23:*:*:*:*:*:*:*", "matchCriteriaId": "DF44C087-DF67-4926-AAC1-C2A0DDC61027", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.24:*:*:*:*:*:*:*", "matchCriteriaId": "484C3F5C-8CF4-4BB2-A329-6D5C34B51D42", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.25:*:*:*:*:*:*:*", "matchCriteriaId": "AF74C5D0-DA54-4242-9116-21B802C3ACFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.26:*:*:*:*:*:*:*", "matchCriteriaId": "06771888-4352-4F57-A5EE-32E51C94786E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*", "matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL injection vulnerability in wptouch/ajax.php in the WPTouch plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter." }, { "lang": "es", "value": "Vulnerabilidad de inyecci\u00f3n SQL en wptouch/ajax.php en el complemento WPTouch para WordPress, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro id" } ], "id": "CVE-2011-4803", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-12-14T00:55:04.607", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/18039" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-89" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…