CVE-2013-2707
Published May 10, 2013
Last updated 12 years ago
Overview
- Description
- Cross-site request forgery (CSRF) vulnerability in the Login With Ajax plugin before 3.1 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that modify this plugin's settings.
- Source
- PSIRT-CNA@flexerasoftware.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.8
- Impact score
- 6.4
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-352
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD2BFC69-0881-4F81-92C5-94F90169119A" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B6726B3-C5FC-4731-953C-C14FF28A4D5B" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F479FF4C-3DC0-4FDD-BB75-619EDDCDF601" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51200B37-BB98-4279-9E45-87171276EE55" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24D1A2ED-7EFF-4039-A165-B7B70CE15EA8" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "68E9C0A4-0D88-4D15-AB3B-0BA4D2791A59" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A08A4525-F020-4E7A-BECB-5D21C9C5236D" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:2.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A9C3628-4A5A-45FE-A63E-DCBA3C51A67D" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1530AD41-0F8E-4F22-9294-91ECC119BA04" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17B94D95-E7F2-44EA-9524-BEE59BD67823" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F10A8857-8D7F-4900-A2FD-6964C3995991" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAB426AB-AB03-47B4-8EDA-AADE504324A4" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "205C80E4-1F6F-48FB-8BBE-4F820470CDBA" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B095308B-B142-4504-BC29-A3C6920E2A6B" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0b:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E6D4FBAE-4196-4745-9F31-73AAA0BE626E" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.0b3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5396F0B7-0888-4041-841B-8CF60C9D5E5C" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F5F1656E-14CE-4E5B-A89C-ED853970D45D" }, { "criteria": "cpe:2.3:a:netweblogic:login_with_ajax:3.1.1:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A48FB80-7A67-4D8D-AEB6-201BE5AF4E56" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1" } ], "operator": "OR" } ], "operator": "AND" } ]