First published: Tue Jan 21 2014(Updated: )
Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=3.3.2 | |
WordPress | =3.0 | |
WordPress | =3.0.1 | |
WordPress | =3.0.2 | |
WordPress | =3.0.3 | |
WordPress | =3.0.4 | |
WordPress | =3.0.5 | |
WordPress | =3.0.6 | |
WordPress | =3.1 | |
WordPress | =3.1.1 | |
WordPress | =3.1.2 | |
WordPress | =3.1.3 | |
WordPress | =3.1.4 | |
WordPress | =3.2 | |
WordPress | =3.2-beta1 | |
WordPress | =3.2.1 | |
WordPress | =3.3 | |
WordPress | =3.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6633 has a medium severity rating due to its potential for cross-site scripting attacks.
To fix CVE-2012-6633, update your WordPress installation to version 3.3.3 or later.
CVE-2012-6633 affects all versions of WordPress prior to 3.3.3, including versions 3.0 to 3.3.2.
CVE-2012-6633 can enable remote attackers to inject arbitrary web scripts or HTML into an editable slug field.
Yes, there are known exploits for CVE-2012-6633 that leverage the cross-site scripting vulnerability.