CVE-2015-2292
Published Mar 17, 2015
Last updated 8 years ago
Overview
- Description
- Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.5
- Impact score
- 6.4
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-89
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:yoast:wordpress_seo:*:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "AFD2D356-0447-4EE8-823D-0500E8496870", "versionEndIncluding": "1.5.6" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.6.0:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "2F19DB4E-EB9B-405E-8C7D-0A7273CEE779" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.6.1:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "58918158-0AEF-4DDB-8B95-56739C5F99CC" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.6.2:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "5FACBDE2-D9F4-4330-9D5E-0336F130D1C5" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.6.3:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "597D08B2-E58E-4AC4-B1F9-660015506A7C" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.7.1:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "84FDF198-8B7E-431A-802E-9EC6A23BAB96" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.7.2:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "8C4468DC-91D8-4AB8-9C13-A826E9AB50C4" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.7.3:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "B87AD79A-90D0-42FB-BA9B-F0E25F44A797" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.7.3.1:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "86C6AA39-810E-4688-991F-4B17672C6FCF" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.7.3.2:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "F7762119-2B03-4B0D-B19A-42C6A74DBCAB" }, { "criteria": "cpe:2.3:a:yoast:wordpress_seo:1.7.3.3:*:*:*:*:wordpress:*:*", "vulnerable": true, "matchCriteriaId": "63AEC8FD-F526-4BB3-BE1D-37B45D7B7F2B" } ], "operator": "OR" } ] } ]