CVE-2012-5328
Severity CVSS v4.0:
Pending analysis
Type:
CWE-89
SQL Injection
Publication date:
08/10/2012
Last modified:
11/04/2025
Description
Multiple SQL injection vulnerabilities in the Mingle Forum plugin 1.0.32.1 and other versions before 1.0.33 for WordPress might allow remote authenticated users to execute arbitrary SQL commands via the (1) memberid or (2) groupid parameters in a removemember action or (3) id parameter to fs-admin/fs-admin.php, or (4) edit_forum_id parameter in an edit_save_forum action to fs-admin/wpf-edit-forum-group.php.
Impact
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cartpauj:mingle-forum:*:*:*:*:*:*:*:* | 1.0.32.1 (including) | |
| cpe:2.3:a:cartpauj:mingle-forum:1.0.00:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.01:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.02:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.03:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.04:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.05:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.06:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.07:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.08:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.09:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.11:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.12:*:*:*:*:*:*:* | ||
| cpe:2.3:a:cartpauj:mingle-forum:1.0.13:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://plugins.trac.wordpress.org/changeset?reponame=&new=492859%40mingle-forum&old=487353%40mingle-forum
- http://wordpress.org/extend/plugins/mingle-forum/changelog/
- http://plugins.trac.wordpress.org/changeset?reponame=&new=492859%40mingle-forum&old=487353%40mingle-forum
- http://wordpress.org/extend/plugins/mingle-forum/changelog/



