CVE-2012-2403

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

wp-includes/formatting.php in WordPress before 3.3.2 attempts to enable clickable links inside attributes, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.

References

http://core.trac.wordpress.org/changeset/20493/branches/3.3/wp-includes/capabilities.php

http://core.trac.wordpress.org/changeset/20493/branches/3.3/wp-includes/formatting.php

http://osvdb.org/81463

http://secunia.com/advisories/48957

http://secunia.com/advisories/49138

http://wordpress.org/news/2012/04/wordpress-3-3-2/

http://www.debian.org/security/2012/dsa-2470

http://www.securityfocus.com/bid/53192

https://exchange.xforce.ibmcloud.com/vulnerabilities/75093

https://exchange.xforce.ibmcloud.com/vulnerabilities/75206

Details

Source: MITRE

Published: 2012-04-21

Updated: 2017-12-19

Type: CWE-79

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.1.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2.4:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.2.5:a:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.3.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.3.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.6.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.7:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.7.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.4:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.4:a:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.5.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.5.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.8.6:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.9:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.9.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.9.1.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:2.9.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0.4:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0.5:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.0.6:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.1.1:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.1.2:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.1.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:3.3:*:*:*:*:*:*:*

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* versions up to 3.3.1 (inclusive)

Tenable Plugins

View all (7 total)

IDNameProductFamilySeverity
9101WordPress < 3.3.2 Multiple VulnerabilitiesNessus Network MonitorCGI
critical
59257Fedora 17 : wordpress-3.3.2-2.fc17 (2012-6494)NessusFedora Local Security Checks
critical
59093Debian DSA-2470-1 : wordpress - several vulnerabilitiesNessusDebian Local Security Checks
critical
59080Fedora 16 : wordpress-3.3.2-2.fc16 (2012-6542)NessusFedora Local Security Checks
critical
59079Fedora 15 : wordpress-3.3.2-2.fc15 (2012-6511)NessusFedora Local Security Checks
critical
59048WordPress < 3.3.2 Multiple VulnerabilitiesNessusCGI abuses
critical
58839FreeBSD : wordpress -- multiple vulnerabilities (b384cc5b-8d56-11e1-8d7b-003067b2972c)NessusFreeBSD Local Security Checks
critical