Vulnerability Details : CVE-2012-5387
Potential exploit
Cross-site request forgery (CSRF) vulnerability in wlcms-plugin.php in the White Label CMS plugin before 1.5.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that modify the developer name via the wlcms_o_developer_name parameter in a save action to wp-admin/admin.php, as demonstrated by a developer name containing XSS sequences.
Vulnerability category: Cross site scripting (XSS)Cross-site request forgery (CSRF)
Products affected by CVE-2012-5387
- cpe:2.3:a:videousermanuals:white-label-cms:*:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.1:*:*:*:*:*:*:*
- cpe:2.3:a:videousermanuals:white-label-cms:1.0.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5387
1.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5387
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2012-5387
-
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5387
-
http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
White Label CMS 1.5 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
-
http://www.exploit-db.com/exploits/22156/
WordPress Plugin White Label CMS 1.5 - Cross-Site Request Forgery / Persistent Cross-Site Scripting - PHP webapps ExploitExploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79520
White Label CMS plugin for WordPress admin.php cross-site request forgery CVE-2012-5387 Vulnerability Report
-
http://www.securityfocus.com/bid/56166
WordPress White Label CMS Plugin HTML Injection and Cross Site Request Forgery Vulnerabilities
-
http://osvdb.org/86568
-
http://wordpress.org/extend/plugins/white-label-cms/changelog/
White Label CMS – WordPress plugin | WordPress.orgPatch
Jump to