fkie_cve-2011-4926
Vulnerability from fkie_nvd
Published
2012-08-29 04:39
Modified
2025-04-11 00:51
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.
References
secalert@redhat.comhttp://plugins.trac.wordpress.org/changeset?reponame=&new=467338%40adminimize&old=466900%40adminimize#file5
secalert@redhat.comhttp://wordpress.org/extend/plugins/adminimize/changelog/
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/01/05/10
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/01/10/9
secalert@redhat.comhttp://www.osvdb.org/77472
secalert@redhat.comhttp://www.securityfocus.com/archive/1/520591
secalert@redhat.comhttp://www.securityfocus.com/archive/1/520591/100/0/threaded
secalert@redhat.comhttp://www.securityfocus.com/bid/50745Exploit
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/71414
af854a3a-2127-422b-91ae-364da2661108http://plugins.trac.wordpress.org/changeset?reponame=&new=467338%40adminimize&old=466900%40adminimize#file5
af854a3a-2127-422b-91ae-364da2661108http://wordpress.org/extend/plugins/adminimize/changelog/
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/01/05/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/01/10/9
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/77472
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/520591
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/520591/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/50745Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/71414



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D57259E-B346-47E7-A922-CF5F1599B249",
              "versionEndIncluding": "1.7.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E68AEC6D-A1A9-43C8-B338-8336A6E1E73F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "11A52DCE-2C5D-4C60-9F8F-DED86701433C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2A11F6D-0428-4379-9931-C26262B0B668",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "164654CC-CD8B-4D9E-8321-FDF6F6208F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8C1C18-6B89-459D-9D42-2613C22B546B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "06FDFDF1-92F2-4A1B-A016-B0FF6CA88F78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E812CD4-0DDD-4D24-B4AC-870A39474AA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "4995FF5A-1615-4B94-8AFA-32BD31B2B38E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC333F5A-AE78-41D2-8CF2-8FAC4D15E1CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "120F4D2D-3BE4-4A70-B04D-D386F7EB83C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6236B2-0F0E-4ACF-8C09-88BDA4615E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF01AC42-DDAF-4357-83DC-55B5DCEA79B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF20A303-9B04-4AF8-A397-230C451AF77E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F71D73C7-6F57-405D-80A4-2C04AB33FFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D352E85-325A-4021-9E7F-974BBE3C6609",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C65BB62-12BD-4DE1-B74C-3AD4118CA410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDA4CEE-173F-4FA0-90E5-C1ED79612B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A72DA0-BB87-428A-8BDC-E9BA4C083996",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BB0BD96-A7C6-4163-9435-E148BD4256B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.3-6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0516FA8C-DC4F-48A5-AD67-FF11A8B9459E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "100FA95C-EBB3-47D2-B1B7-825062A2AB76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D29FE5F-DA24-496C-B8A0-A1AAB55223D1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3400FD7-D03E-43CD-A547-B11327186E25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C519C5-A66C-4E79-9F1D-F9CA2BEE1B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.5.3-8:*:*:*:*:*:*:*",
              "matchCriteriaId": "07368574-99A2-49B0-956E-FAC97BEE5FD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "227A927F-AA2C-446A-A4E4-208C65EDA5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCFEB09D-FC4B-4D71-A539-5AF962877BF6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B20118C1-8477-491F-9B1A-B701BC468903",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8423151-D3D1-42ED-A154-0F9F4FA3D388",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.6-7:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B943E1C-5C6A-447E-A3B9-B0A87C75B964",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D6423D-BED8-40E2-BC98-C2B5AAE8A225",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B44EDC-7F4D-465B-A7FB-C7BE4EE5F893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D74314-089C-4CB5-9525-50FD5D7AD0F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D38004C-3087-4985-BD7F-20ECE2CA4B04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BAC9A37-7C56-43F4-AD11-D1233C0A5A4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD1B0A78-5C86-463C-B7C7-32B3AD846CE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0D8186-824C-4DC1-9DFD-8AD5686CA39E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AA994E9-1BA2-43AE-BD84-8823DE0C21F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA6165D4-14A2-4D28-BFA1-0E85489450A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "26914F84-4635-4DD7-B860-23AB1020DBA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C564E304-6918-4458-BEA4-BC0A55ADD364",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DE9E389-F3A4-4BFE-9E3D-33761C7DB588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAD6E77-128A-4CE0-B738-594358C2587D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6C8EB25-29FF-4134-8F1E-E9693FAD887E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "64A47AE5-1E07-4D84-A71E-84325A8BFB3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABC1BDAE-8DEA-481F-A0ED-96E7A9077B4D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2725D348-FBC3-4282-9004-2FB555DCED3B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4AD101-DF69-4328-B998-50EDB4D48BFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "087B505A-873A-4219-9C52-41F45571518C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E90691-C76A-400C-868D-A04727A73875",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "B323620B-EF43-4EF8-8852-F42ECAAAB51D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "D056850B-E4D9-40F0-BD1D-52A96E7FCAF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:bueltge:adminimize:1.7.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1FFB25A-EBB4-4F66-AF76-0D1FAD717E05",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS)en adminimize/adminimize_page.php en el plugin anterior a v1.7.22 para WordPress permite a atacantes remotos inyectar c\u00f3digo web o HTML a trav\u00e9s del par\u00e1metro page."
    }
  ],
  "id": "CVE-2011-4926",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2012-08-29T04:39:40.707",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=467338%40adminimize\u0026old=466900%40adminimize#file5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://wordpress.org/extend/plugins/adminimize/changelog/"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/05/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/10/9"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/77472"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/520591"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/archive/1/520591/100/0/threaded"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/50745"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71414"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://plugins.trac.wordpress.org/changeset?reponame=\u0026new=467338%40adminimize\u0026old=466900%40adminimize#file5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://wordpress.org/extend/plugins/adminimize/changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/05/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/01/10/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/77472"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/520591"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/520591/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/50745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71414"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…