CVE-2013-2700
Published May 14, 2014
Last updated 11 years ago
Overview
- Description
- Cross-site request forgery (CSRF) vulnerability in the Add/Edit page (adminmenus.php) in the WP125 plugin before 1.5.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that add or edit an ad via unspecified vectors.
- Source
- PSIRT-CNA@flexerasoftware.com
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:webmaster-source:wp125:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "99B9FCE8-854D-4F92-B641-6DF6D7DF646C", "versionEndIncluding": "1.4.9" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.0.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "86E28C01-A224-47DF-AE09-C9BF85FCE2F9" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.1.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "B87194DE-1CCC-4393-9B66-416CB736EB2B" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.2.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "A5924A67-7AC2-42D5-AA4A-7A698AB9831E" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.3.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "DCCC7E83-0ACD-4DA2-9F46-DA5C5C078095" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.3.7:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "FB2F4E46-7CDB-4532-8B36-320F8FE05326" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.3.8:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "9B98768B-2E0B-4B5E-A11A-094C03087A63" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.3.9:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "19FE5A81-742B-4971-A564-30D4FA13FBB1" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "6EEE0501-9512-4C12-BBC1-BFD0B1995DE2" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.1:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "EDD8D26A-0B49-4A47-93DA-DFABA479273C" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.2:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "4E523FF4-6768-4B7D-81BA-D71ED28B51C7" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.3:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "CDC8FBB5-8593-48BA-A002-BBD8F78392C6" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.4:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "9D43C15B-E5A4-4350-B22C-32F7838BBE32" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.5:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "ED92D707-457F-4000-A67E-3842C0AEEA43" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.6:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "E0AFBBCE-3082-4F7A-A3A1-BCE5674E939B" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.7:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "4DFAF66C-7CE0-4F47-8B1D-A0F83E720EBB" }, { "criteria": "cpe:2.3:a:webmaster-source:wp125:1.4.8:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "39646A91-8196-4606-BA22-0A05A1313E33" } ], "operator": "OR" } ] } ]