Vulnerability Description
Cross-site scripting (XSS) vulnerability in wp-comments-post.php in WordPress 3.3.x before 3.3.1, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via the query string in a POST operation that is not properly handled by the "Duplicate comment detected" feature.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 3.3 |
| Microsoft | Internet Explorer | All versions |
Related Weaknesses (CWE)
References
- http://oldmanlab.blogspot.com/2012/01/wordpress-33-xss-vulnerability.htmlExploit
- http://www.securityfocus.com/bid/51237
- http://www.securitytracker.com/id?1026542
- https://wordpress.org/news/2012/01/wordpress-3-3-1/PatchVendor Advisory
- http://oldmanlab.blogspot.com/2012/01/wordpress-33-xss-vulnerability.htmlExploit
- http://www.securityfocus.com/bid/51237
- http://www.securitytracker.com/id?1026542
- https://wordpress.org/news/2012/01/wordpress-3-3-1/PatchVendor Advisory
FAQ
What is CVE-2012-0287?
CVE-2012-0287 is a vulnerability with a CVSS score of 2.6 (LOW). Cross-site scripting (XSS) vulnerability in wp-comments-post.php in WordPress 3.3.x before 3.3.1, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via the...
How severe is CVE-2012-0287?
CVE-2012-0287 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-0287?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress, Microsoft Internet Explorer.