Vulnerability Description
The Organizer plugin 1.2.1 for WordPress allows remote attackers to obtain the installation path via unspecified vectors to (1) plugin_hook.php, (2) page/index.php, (3) page/dir.php (4) page/options.php, (5) page/resize.php, (6) page/upload.php, (7) page/users.php, or (8) page/view.php.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Organizer Project | Organizer | <= 1.2.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-SiteExploitThird Party AdvisoryVDB Entry
- http://websecurity.com.ua/5782ExploitThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75107Third Party AdvisoryVDB Entry
- http://packetstormsecurity.org/files/112086/WordPress-Organizer-1.2.1-Cross-SiteExploitThird Party AdvisoryVDB Entry
- http://websecurity.com.ua/5782ExploitThird Party Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/75107Third Party AdvisoryVDB Entry
FAQ
What is CVE-2012-6512?
CVE-2012-6512 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Organizer plugin 1.2.1 for WordPress allows remote attackers to obtain the installation path via unspecified vectors to (1) plugin_hook.php, (2) page/index.php, (3) page/dir.php (4) page/options.p...
How severe is CVE-2012-6512?
CVE-2012-6512 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6512?
Check the references section above for vendor advisories and patch information. Affected products include: Organizer Project Organizer.