Vulnerability Details : CVE-2012-5388
Cross-site scripting (XSS) vulnerability in wlcms-plugin.php in the White Label CMS plugin 1.5 for WordPress allows remote authenticated administrators to inject arbitrary web script or HTML via the wlcms_o_developer_name parameter in a save action to wp-admin/admin.php, a related issue to CVE-2012-5387.
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2012-5388
- cpe:2.3:a:videousermanuals:white-label-cms:1.5:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-5388
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 45 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2012-5388
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
CWE ids for CVE-2012-5388
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-5388
-
http://packetstormsecurity.org/files/117590/White-Label-CMS-1.5-Cross-Site-Request-Forgery-Cross-Site-Scripting.html
White Label CMS 1.5 Cross Site Request Forgery / Cross Site Scripting ≈ Packet Storm
-
http://www.exploit-db.com/exploits/22156/
WordPress Plugin White Label CMS 1.5 - Cross-Site Request Forgery / Persistent Cross-Site Scripting - PHP webapps ExploitExploit
-
http://www.securityfocus.com/bid/56166
WordPress White Label CMS Plugin HTML Injection and Cross Site Request Forgery Vulnerabilities
-
http://wordpress.org/extend/plugins/white-label-cms/changelog/
White Label CMS – WordPress plugin | WordPress.orgPatch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/79522
White Label CMS plugin for WordPress admin.php cross-site scripting CVE-2012-5388 Vulnerability Report
Jump to