Vulnerability Description
SQL injection vulnerability in wp-postratings.php in the WP-PostRatings plugin 1.50, 1.61, and probably other versions before 1.62 for WordPress allows remote authenticated users with the Author role to execute arbitrary SQL commands via the id attribute of the ratings shortcode when creating a post. NOTE: some of these details are obtained from third party information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Lesterchan | Wp-Postratings | 1.50 |
| Wordpress | Wordpress | All versions |
Related Weaknesses (CWE)
References
- http://plugins.trac.wordpress.org/changeset/430970/wp-postratings/trunk/wp-postrExploitPatch
- http://secunia.com/advisories/46328Vendor Advisory
- http://wordpress.org/extend/plugins/wp-postratings/changelog/
- http://www.securityfocus.com/bid/49986
- http://plugins.trac.wordpress.org/changeset/430970/wp-postratings/trunk/wp-postrExploitPatch
- http://secunia.com/advisories/46328Vendor Advisory
- http://wordpress.org/extend/plugins/wp-postratings/changelog/
- http://www.securityfocus.com/bid/49986
FAQ
What is CVE-2011-4646?
CVE-2011-4646 is a vulnerability with a CVSS score of 6.0 (MEDIUM). SQL injection vulnerability in wp-postratings.php in the WP-PostRatings plugin 1.50, 1.61, and probably other versions before 1.62 for WordPress allows remote authenticated users with the Author role ...
How severe is CVE-2011-4646?
CVE-2011-4646 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4646?
Check the references section above for vendor advisories and patch information. Affected products include: Lesterchan Wp-Postratings, Wordpress Wordpress.