Vulnerability Details : CVE-2013-6243
SQL injection vulnerability in the Landing Pages plugin 1.2.3, before 20131009, and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the "post" parameter to index.php.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2013-6243
Probability of exploitation activity in the next 30 days: 0.74%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 79 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6243
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2013-6243
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6243
-
http://plugins.trac.wordpress.org/changeset?reponame=&old=785535%40landing-pages&new=785535%40landing-pages
Changeset 785535 for landing-pages – WordPress Plugin RepositoryExploit;Patch
-
http://wordpress.org/plugins/landing-pages/changelog
WordPress Landing Pages – WordPress plugin | WordPress.org
-
http://www.securityfocus.com/bid/62942
WordPress Landing Pages Plugin 'post' Parameter SQL Injection Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/87803
Landing Pages plugin for WordPress index.php SQL injection CVE-2013-6243 Vulnerability Report
Products affected by CVE-2013-6243
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:*:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.2.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.1.9:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.9.0:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.8.6:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.5.6:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.5.3:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.1.0.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.9.9:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.8.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.1.8:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.1.7:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.8.5:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.8.4:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.5.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.4.4:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.7.9:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.4.2:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.4.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.9.4:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.9.3:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.7.3:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.7.1:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.3.9:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.3.8:-:*:*:*:wordpress:*:*
- cpe:2.3:a:landing_pages_project:landing_pages_plugin:1.0.3.7:-:*:*:*:wordpress:*:*