Vulnerability Description
SQL injection vulnerability in the Landing Pages plugin 1.2.3, before 20131009, and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the "post" parameter to index.php.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Landing Pages Project | Landing Pages Plugin | <= 1.2.3 |
Related Weaknesses (CWE)
References
- http://osvdb.org/98334
- http://plugins.trac.wordpress.org/changeset?reponame=&old=785535%40landing-pagesExploitPatch
- http://secunia.com/advisories/55192Vendor Advisory
- http://wordpress.org/plugins/landing-pages/changelog
- http://www.securityfocus.com/bid/62942
- https://exchange.xforce.ibmcloud.com/vulnerabilities/87803
- http://osvdb.org/98334
- http://plugins.trac.wordpress.org/changeset?reponame=&old=785535%40landing-pagesExploitPatch
- http://secunia.com/advisories/55192Vendor Advisory
- http://wordpress.org/plugins/landing-pages/changelog
- http://www.securityfocus.com/bid/62942
- https://exchange.xforce.ibmcloud.com/vulnerabilities/87803
FAQ
What is CVE-2013-6243?
CVE-2013-6243 is a vulnerability with a CVSS score of 7.5 (HIGH). SQL injection vulnerability in the Landing Pages plugin 1.2.3, before 20131009, and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the "post" parameter to index.ph...
How severe is CVE-2013-6243?
CVE-2013-6243 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-6243?
Check the references section above for vendor advisories and patch information. Affected products include: Landing Pages Project Landing Pages Plugin.