fkie_cve-2011-4926
Vulnerability from fkie_nvd
Published
2012-08-29 04:39
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D57259E-B346-47E7-A922-CF5F1599B249", "versionEndIncluding": "1.7.21", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "E68AEC6D-A1A9-43C8-B338-8336A6E1E73F", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7:*:*:*:*:*:*:*", "matchCriteriaId": "11A52DCE-2C5D-4C60-9F8F-DED86701433C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "E2A11F6D-0428-4379-9931-C26262B0B668", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "164654CC-CD8B-4D9E-8321-FDF6F6208F5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "BC8C1C18-6B89-459D-9D42-2613C22B546B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "06FDFDF1-92F2-4A1B-A016-B0FF6CA88F78", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "6E812CD4-0DDD-4D24-B4AC-870A39474AA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "4995FF5A-1615-4B94-8AFA-32BD31B2B38E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "CC333F5A-AE78-41D2-8CF2-8FAC4D15E1CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "120F4D2D-3BE4-4A70-B04D-D386F7EB83C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.8:*:*:*:*:*:*:*", "matchCriteriaId": "CD6236B2-0F0E-4ACF-8C09-88BDA4615E84", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "BF01AC42-DDAF-4357-83DC-55B5DCEA79B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FF20A303-9B04-4AF8-A397-230C451AF77E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.1:*:*:*:*:*:*:*", "matchCriteriaId": "F71D73C7-6F57-405D-80A4-2C04AB33FFC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.2:*:*:*:*:*:*:*", "matchCriteriaId": "7D352E85-325A-4021-9E7F-974BBE3C6609", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.3:*:*:*:*:*:*:*", "matchCriteriaId": "1C65BB62-12BD-4DE1-B74C-3AD4118CA410", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.4:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA4CEE-173F-4FA0-90E5-C1ED79612B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "46A72DA0-BB87-428A-8BDC-E9BA4C083996", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "7BB0BD96-A7C6-4163-9435-E148BD4256B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.3-6:*:*:*:*:*:*:*", "matchCriteriaId": "0516FA8C-DC4F-48A5-AD67-FF11A8B9459E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "100FA95C-EBB3-47D2-B1B7-825062A2AB76", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.5:*:*:*:*:*:*:*", "matchCriteriaId": "5D29FE5F-DA24-496C-B8A0-A1AAB55223D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D3400FD7-D03E-43CD-A547-B11327186E25", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "96C519C5-A66C-4E79-9F1D-F9CA2BEE1B04", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.5.3-8:*:*:*:*:*:*:*", "matchCriteriaId": "07368574-99A2-49B0-956E-FAC97BEE5FD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "227A927F-AA2C-446A-A4E4-208C65EDA5B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "CCFEB09D-FC4B-4D71-A539-5AF962877BF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "B20118C1-8477-491F-9B1A-B701BC468903", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "D8423151-D3D1-42ED-A154-0F9F4FA3D388", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.6-7:*:*:*:*:*:*:*", "matchCriteriaId": "5B943E1C-5C6A-447E-A3B9-B0A87C75B964", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.8:*:*:*:*:*:*:*", "matchCriteriaId": "15D6423D-BED8-40E2-BC98-C2B5AAE8A225", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.9:*:*:*:*:*:*:*", "matchCriteriaId": "B1B44EDC-7F4D-465B-A7FB-C7BE4EE5F893", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7:*:*:*:*:*:*:*", "matchCriteriaId": "91D74314-089C-4CB5-9525-50FD5D7AD0F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "2D38004C-3087-4985-BD7F-20ECE2CA4B04", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "5BAC9A37-7C56-43F4-AD11-D1233C0A5A4C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "CD1B0A78-5C86-463C-B7C7-32B3AD846CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "EF0D8186-824C-4DC1-9DFD-8AD5686CA39E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0AA994E9-1BA2-43AE-BD84-8823DE0C21F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.6:*:*:*:*:*:*:*", "matchCriteriaId": "DA6165D4-14A2-4D28-BFA1-0E85489450A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "26914F84-4635-4DD7-B860-23AB1020DBA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.8:*:*:*:*:*:*:*", "matchCriteriaId": "C564E304-6918-4458-BEA4-BC0A55ADD364", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.9:*:*:*:*:*:*:*", "matchCriteriaId": "8DE9E389-F3A4-4BFE-9E3D-33761C7DB588", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.10:*:*:*:*:*:*:*", "matchCriteriaId": "BBAD6E77-128A-4CE0-B738-594358C2587D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.11:*:*:*:*:*:*:*", "matchCriteriaId": "D6C8EB25-29FF-4134-8F1E-E9693FAD887E", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.12:*:*:*:*:*:*:*", "matchCriteriaId": "64A47AE5-1E07-4D84-A71E-84325A8BFB3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.13:*:*:*:*:*:*:*", "matchCriteriaId": "ABC1BDAE-8DEA-481F-A0ED-96E7A9077B4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.14:*:*:*:*:*:*:*", "matchCriteriaId": "2725D348-FBC3-4282-9004-2FB555DCED3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.15:*:*:*:*:*:*:*", "matchCriteriaId": "DC4AD101-DF69-4328-B998-50EDB4D48BFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.16:*:*:*:*:*:*:*", "matchCriteriaId": "087B505A-873A-4219-9C52-41F45571518C", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.17:*:*:*:*:*:*:*", "matchCriteriaId": "52E90691-C76A-400C-868D-A04727A73875", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.18:*:*:*:*:*:*:*", "matchCriteriaId": "B323620B-EF43-4EF8-8852-F42ECAAAB51D", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.19:*:*:*:*:*:*:*", "matchCriteriaId": "D056850B-E4D9-40F0-BD1D-52A96E7FCAF3", "vulnerable": true }, { "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.20:*:*:*:*:*:*:*", "matchCriteriaId": "A1FFB25A-EBB4-4F66-AF76-0D1FAD717E05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter." }, { "lang": "es", "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS)en adminimize/adminimize_page.php en el plugin anterior a v1.7.22 para WordPress permite a atacantes remotos inyectar c\u00f3digo web o HTML a trav\u00e9s del par\u00e1metro page." } ], "id": "CVE-2011-4926", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2012-08-29T04:39:40.707", "references": [ { "source": "secalert@redhat.com", "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=467338%40adminimize\u0026old=466900%40adminimize#file5" }, { "source": "secalert@redhat.com", "url": "http://wordpress.org/extend/plugins/adminimize/changelog/" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/01/05/10" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/01/10/9" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/77472" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/520591" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/archive/1/520591/100/0/threaded" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/50745" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71414" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=467338%40adminimize\u0026old=466900%40adminimize#file5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wordpress.org/extend/plugins/adminimize/changelog/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/01/05/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/01/10/9" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/77472" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/520591" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/520591/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/50745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71414" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…