Vulnerability Description
WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.
CVSS Score
5.0
MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 3.1 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/49138
- http://wordpress.org/news/2011/05/wordpress-3-1-3/Patch
- http://www.debian.org/security/2012/dsa-2470
- http://www.securityfocus.com/bid/47995
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69173
- http://secunia.com/advisories/49138
- http://wordpress.org/news/2011/05/wordpress-3-1-3/Patch
- http://www.debian.org/security/2012/dsa-2470
- http://www.securityfocus.com/bid/47995
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69173
FAQ
What is CVE-2011-3126?
CVE-2011-3126 is a vulnerability with a CVSS score of 5.0 (MEDIUM). WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 allows remote attackers to determine usernames of non-authors via canonical redirects.
How severe is CVE-2011-3126?
CVE-2011-3126 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3126?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.