4.3
CVSSv2

CVE-2013-2205

Published: 08/07/2013 Updated: 31/12/2016
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The default configuration of SWFUpload in WordPress prior to 3.5.2 has an unrestrictive security.allowDomain setting, which allows remote malicious users to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted web site.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress 3.4.0

wordpress wordpress 3.3

wordpress wordpress 2.1.3

wordpress wordpress 2.2.3

wordpress wordpress 2.8.6

wordpress wordpress 2.6.3

wordpress wordpress 2.3.2

wordpress wordpress 2.0.1

wordpress wordpress 3.3.2

wordpress wordpress 2.5.1

wordpress wordpress 2.0.9

wordpress wordpress 2.2

wordpress wordpress 2.0.2

wordpress wordpress 1.6.2

wordpress wordpress 2.8.4

wordpress wordpress 2.0.4

wordpress wordpress 1.3.2

wordpress wordpress 2.8

wordpress wordpress 3.3.3

wordpress wordpress 0.71

wordpress wordpress 2.0.5

wordpress wordpress 2.8.1

wordpress wordpress 1.5.2

wordpress wordpress 1.0.1

wordpress wordpress 2.9

wordpress wordpress 2.3.1

wordpress wordpress 2.6.1

wordpress wordpress 2.8.5.1

wordpress wordpress 2.9.2

wordpress wordpress 3.3.1

wordpress wordpress 2.0.10

wordpress wordpress 2.9.1

wordpress wordpress 1.2.5

wordpress wordpress 2.6

wordpress wordpress 2.0.8

wordpress wordpress 2.3

wordpress wordpress 2.8.5.2

wordpress wordpress 1.2.3

wordpress wordpress 2.0.11

wordpress wordpress 1.3.3

wordpress wordpress 2.0

wordpress wordpress 2.1.1

wordpress wordpress 3.5.0

wordpress wordpress 2.1

wordpress wordpress 1.1.1

wordpress wordpress 1.2.4

wordpress wordpress 2.0.6

wordpress wordpress 1.2.1

wordpress wordpress 2.0.7

wordpress wordpress 2.1.2

wordpress wordpress 2.7.1

wordpress wordpress 2.8.3

wordpress wordpress 2.6.5

wordpress wordpress 2.2.2

wordpress wordpress 2.3.3

wordpress wordpress 1.5.1.1

wordpress wordpress 2.2.1

wordpress wordpress 2.7

wordpress wordpress 2.6.2

wordpress wordpress 1.0.2

wordpress wordpress 1.5.1.2

wordpress wordpress

wordpress wordpress 1.2

wordpress wordpress 2.5

wordpress wordpress 1.2.2

wordpress wordpress 1.0

wordpress wordpress 1.5

wordpress wordpress 2.8.2

wordpress wordpress 3.4.2

wordpress wordpress 1.5.1

wordpress wordpress 3.4.1

wordpress wordpress 1.5.1.3

wordpress wordpress 2.9.1.1

wordpress wordpress 1.3

wordpress wordpress 2.8.5

Vendor Advisories

Several vulnerabilities were identified in WordPress, a web blogging tool As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the wordpress package to the latest upstream version instead of backporting the patches This means extra care should be taken when upgrading, ...
Debian Bug report logs - #713947 wordpress: Multiple security issues Package: wordpress; Maintainer for wordpress is Craig Small <csmall@debianorg>; Source for wordpress is src:wordpress (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 24 Jun 2013 06:39:02 UTC Severity: grave Tags: ...

Github Repositories

A fork of the long-abandoned SWFUpload project, maintained by WordPress and others to ensure that a secure version of SWFUpload exists. Report security vulnerabilities to swfupload-security@wordpress.org.

SWFUpload (Maintained for Security Fixes) This is a fork of the long-abandoned SWFUpload project, maintained by WordPress and others to ensure that a secure version of SWFUpload exists We strongly suggest you do not use SWFUpload But if you must, use this fork WordPress is maintaining a secure version of SWFUpload for use by WordPress plugins that have yet to be updated to u