First published: Tue Sep 04 2012(Updated: )
SQL injection vulnerability in wp-load.php in the BuddyPress plugin 1.5.x before 1.5.5 of WordPress allows remote attackers to execute arbitrary SQL commands via the page parameter in an activity_widget_filter action.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
BuddyPress | =1.5 | |
BuddyPress | =1.5.1 | |
BuddyPress | =1.5.2 | |
BuddyPress | =1.5.3 | |
BuddyPress | =1.5.3.1 | |
BuddyPress | =1.5.4 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2109 is categorized as a critical SQL injection vulnerability that can lead to arbitrary SQL command execution.
To fix CVE-2012-2109, upgrade the BuddyPress plugin to version 1.5.5 or later.
CVE-2012-2109 affects BuddyPress versions 1.5.x prior to 1.5.5.
Yes, CVE-2012-2109 can be exploited by remote attackers to execute unauthorized SQL commands.
Exploiting CVE-2012-2109 can lead to data breaches and potential manipulation of the database.