fkie_cve-2013-1409
Vulnerability from fkie_nvd
Published
2014-03-03 16:55
Modified
2025-04-12 10:46
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:commentluv:commentluv:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "36AC3DC8-B92A-40B2-BFC7-681F867D5124",
"versionEndIncluding": "2.92.3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "636F95AC-AB76-40B3-800B-6E3553F4BD57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.71:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6A160A4A-8CC5-4F9D-A933-C6874FE82E32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.74:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B26BC56F-565B-4112-919F-F0BF8527B877",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.76:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7F43AE7C-B045-46F1-B802-115D776C4F37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.80:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "AACA8D0D-4CF9-49CD-9165-BEEA27DA5DB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "55F90B7D-8E3C-4EEC-B380-74487EE55883",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "62D1D899-8E19-4C9A-BB88-1C3C09967AB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D5DD1386-A4EC-4FCB-8D71-DEE7D74BC6C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BA7D914B-D5E9-4D11-88D5-8FB0CE51FD6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "31F16D61-7302-44C0-B5CC-B0A1DDA0FB69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "72C721D4-2379-488A-A658-4BFE697B738F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "8B286A24-D3C9-456C-8C5C-0DD02144558C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "64673FB4-F816-428F-8343-323E66EC37BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.81.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BBB9028D-F0C1-4CAB-9DA3-BC13955C23DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "93BBEC41-0674-4622-94FD-91A684530027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "332C7F14-B480-4E5A-95BD-71D743BE2846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E3B04456-63FA-4630-8A28-E0D6B8B77C93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "EBED00D9-1101-404B-BD23-5977231A980A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "82D81550-4217-4513-99BA-5F6DB1840911",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "CA0BD285-1310-495A-981F-5D0F37B0B4D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.8.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "084A7FD3-C2A2-4482-9529-0A10CBAFF80C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.8.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C0D91DC7-E812-4E2A-8790-B9005B2E9D55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.8.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A76AFA9E-E085-405A-96A0-67B02552755F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "9B5F9979-C1B3-4987-9912-3948566BA987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "DF48AA18-FBA9-446D-8A67-3EE72EA9DF34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7452E8FE-552C-4010-A30B-DEA153EB214B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "4422023A-5A1A-4511-8DD8-95B450457E00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "26AAEE87-2A9D-49E7-B33F-DE398681404F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "AF8F5E1D-946E-42A7-83E1-36AF967000E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "13781B66-74F4-4D07-BFFE-B0D4C1F73DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6DAA92E2-B958-4172-9C03-4E5026292D30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "083CAC46-FD42-4D7A-8A4F-CEFED58989E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D0296CA9-680C-4745-9B88-78C1587916B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.9.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "3FDBA268-58C2-4D9D-BD29-0253D04881A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.9.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BD2851D4-28D9-439B-AF0C-F72AFF6AD01E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.90.9.9.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "462BDBCC-1A8D-4817-9C64-E8E159A15298",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.91:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "58DA1AF1-DD5D-46D6-9172-BE68D6FA7839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.91.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "0BD6A38C-8C0A-4DB4-B0E1-0A99A1D0E67E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.92:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D802EC3C-0B7E-4876-B2FE-F1EE3038DFC7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.92.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "1C80DC69-BEC5-4A5F-A704-8B271811810C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.92.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BDB73AA8-C6E0-4E2B-9B48-32C8D83B72C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.761:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "8B18A235-08E9-4813-9D11-09C825BC1B74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.762:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C241FC71-3FD3-431D-8859-D123B56FA39B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.763:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "8D65A860-5515-4EDB-961B-F84A96723533",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.764:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "65EBC1DD-1B46-4B88-BE7F-351DD2C6A278",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.765:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6438E003-753C-48AC-8B58-5D2D01302AED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.766:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B1C00768-505B-47A4-BB8B-F0618ECCFF24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.767:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7A45A15B-657B-4F94-BA9B-5F28D9060F9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.768:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "1AF05FCC-E6A5-441A-BA00-85B7DCF6F33D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.769:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "0DC1CE81-1C52-46F2-B2E7-0855530D08EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:commentluv:commentluv:2.7691:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "71094D1E-9F8A-4BDD-9D01-C4FB8C0C7BEF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross-site scripting (XSS) vulnerability in the CommentLuv plugin before 2.92.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the _ajax_nonce parameter to wp-admin/admin-ajax.php."
},
{
"lang": "es",
"value": "Vulnerabilidad de XSS en el plugin CommentLuv anterior a 2.92.4 para WordPress permite a atacantes remotos inyectar script Web o HTML arbitrarios a trav\u00e9s del par\u00e1metro _ajax_nonce hacia wp-admin/admin-ajax.php."
}
],
"id": "CVE-2013-1409",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-03-03T16:55:03.677",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html"
},
{
"source": "cve@mitre.org",
"url": "http://osvdb.org/89925"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html"
},
{
"source": "cve@mitre.org",
"url": "http://wordpress.org/plugins/commentluv/changelog"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "https://www.htbridge.com/advisory/HTB23138"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-02/0031.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/89925"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://packetstormsecurity.com/files/120090/WordPress-CommentLuv-2.92.3-Cross-Site-Scripting.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://wordpress.org/plugins/commentluv/changelog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "https://www.htbridge.com/advisory/HTB23138"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…