First published: Fri Jan 25 2013(Updated: )
Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/WordPress | <3.5.1 | 3.5.1 |
Moxiecode plupload | <=1.5.4 | |
Moxiecode plupload | =1.4.0 | |
Moxiecode plupload | =1.4.1 | |
Moxiecode plupload | =1.4.2 | |
Moxiecode plupload | =1.4.3 | |
Moxiecode plupload | =1.5.0 | |
Moxiecode plupload | =1.5.0-beta | |
Moxiecode plupload | =1.5.1 | |
Moxiecode plupload | =1.5.2 | |
Moxiecode plupload | =1.5.3 | |
WordPress | <=3.5.0 | |
WordPress | =0.71 | |
WordPress | =1.0 | |
WordPress | =1.0.1 | |
WordPress | =1.0.2 | |
WordPress | =1.1.1 | |
WordPress | =1.2 | |
WordPress | =1.2.1 | |
WordPress | =1.2.2 | |
WordPress | =1.2.3 | |
WordPress | =1.2.4 | |
WordPress | =1.2.5 | |
WordPress | =1.2.5-a | |
WordPress | =1.3 | |
WordPress | =1.3.2 | |
WordPress | =1.3.3 | |
WordPress | =1.5 | |
WordPress | =1.5.1 | |
WordPress | =1.5.1.1 | |
WordPress | =1.5.1.2 | |
WordPress | =1.5.1.3 | |
WordPress | =1.5.2 | |
WordPress | =1.6.2 | |
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.2 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.0.8 | |
WordPress | =2.0.9 | |
WordPress | =2.0.10 | |
WordPress | =2.0.11 | |
WordPress | =2.1 | |
WordPress | =2.1.1 | |
WordPress | =2.1.2 | |
WordPress | =2.1.3 | |
WordPress | =2.2 | |
WordPress | =2.2.1 | |
WordPress | =2.2.2 | |
WordPress | =2.2.3 | |
WordPress | =2.3 | |
WordPress | =2.3.1 | |
WordPress | =2.3.2 | |
WordPress | =2.3.3 | |
WordPress | =2.5 | |
WordPress | =2.5.1 | |
WordPress | =2.6 | |
WordPress | =2.6.1 | |
WordPress | =2.6.2 | |
WordPress | =2.6.3 | |
WordPress | =2.6.5 | |
WordPress | =2.7 | |
WordPress | =2.7.1 | |
WordPress | =2.8 | |
WordPress | =2.8.1 | |
WordPress | =2.8.2 | |
WordPress | =2.8.3 | |
WordPress | =2.8.4 | |
WordPress | =2.8.4-a | |
WordPress | =2.8.5 | |
WordPress | =2.8.5.1 | |
WordPress | =2.8.5.2 | |
WordPress | =2.8.6 | |
WordPress | =2.9 | |
WordPress | =2.9.1 | |
WordPress | =2.9.1.1 | |
WordPress | =2.9.2 | |
WordPress | =3.3 | |
WordPress | =3.3.1 | |
WordPress | =3.3.2 | |
WordPress | =3.3.3 | |
WordPress | =3.4.0 | |
WordPress | =3.4.1 | |
WordPress | =3.4.2 | |
Fedora | =16 | |
Fedora | =17 | |
Fedora | =18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-0237 is classified as a medium severity vulnerability due to its potential to allow remote code execution via cross-site scripting.
To remediate CVE-2013-0237, upgrade to WordPress version 3.5.1 or later, or ensure that Moxiecode plupload is updated to version 1.5.5 or later.
CVE-2013-0237 affects versions of WordPress prior to 3.5.1 and Moxiecode plupload versions up to 1.5.4.
CVE-2013-0237 exploits web applications by allowing an attacker to inject arbitrary JavaScript or HTML via the id parameter in Plupload.
There is no specific workaround for CVE-2013-0237; the only effective mitigation is to upgrade the affected software to the latest versions.