CVE-2012-1011
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
07/02/2012
Last modified:
11/04/2025
Description
actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:likno:allwebmenus_plugin:1.1.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html
- http://secunia.com/advisories/47659
- http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/
- http://www.exploit-db.com/exploits/18407
- http://www.securityfocus.com/bid/51615
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72640
- http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html
- http://secunia.com/advisories/47659
- http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/
- http://www.exploit-db.com/exploits/18407
- http://www.securityfocus.com/bid/51615
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72640



