CVE-2012-5350

SQL injection vulnerability in the Pay With Tweet plugin before 1.2 for WordPress allows remote authenticated users with certain permissions to execute arbitrary SQL commands via the id parameter in a paywithtweet shortcode.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:wordpress:pay-with-tweet:*:*:*:*:*:*:*:*
cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*

History

21 Nov 2024, 01:44

Type Values Removed Values Added
References () http://secunia.com/advisories/47475 - Vendor Advisory () http://secunia.com/advisories/47475 - Vendor Advisory
References () http://wordpress.org/extend/plugins/pay-with-tweet/changelog/ - () http://wordpress.org/extend/plugins/pay-with-tweet/changelog/ -
References () http://www.exploit-db.com/exploits/18330 - Exploit () http://www.exploit-db.com/exploits/18330 - Exploit
References () http://www.osvdb.org/78204 - () http://www.osvdb.org/78204 -
References () http://www.securityfocus.com/bid/51308 - Exploit () http://www.securityfocus.com/bid/51308 - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/72165 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/72165 -

Information

Published : 2012-10-09 15:55

Updated : 2024-11-21 01:44


NVD link : CVE-2012-5350

Mitre link : CVE-2012-5350

CVE.ORG link : CVE-2012-5350


JSON object : View

Products Affected

wordpress

  • pay-with-tweet
  • wordpress
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')