Vulnerability Details : CVE-2012-4421
The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature.
Products affected by CVE-2012-4421
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress:3.3.1:*:*:*:*:*:*:*
Threat overview for CVE-2012-4421
Top countries where our scanners detected CVE-2012-4421
Top open port discovered on systems with this issue
80
IPs affected by CVE-2012-4421 38
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2012-4421!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2012-4421
0.18%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 56 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-4421
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST |
CWE ids for CVE-2012-4421
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-4421
-
http://openwall.com/lists/oss-security/2012/09/13/4
oss-security - Re: CVEs for wordpress 3.4.2 release
-
http://core.trac.wordpress.org/changeset?old_path=%2Ftags%2F3.4.1&old=21780&new_path=%2Ftags%2F3.4.2&new=21780#file2
Diff from tags/3.4.1@21780 to tags/3.4.2@21780 – WordPress TracExploit;Patch
-
http://codex.wordpress.org/Version_3.4.2
Version 3.4.2 | WordPress.org
Jump to