Show plain JSON{"id": "CVE-2011-5207", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2012-10-04T17:55:01.120", "references": [{"url": "http://packetstormsecurity.org/files/view/108272/wpcartpress-xss.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://plugins.trac.wordpress.org/changeset/482746/thecartpress", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/47427", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/51216", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72070", "source": "cve@mitre.org"}, {"url": "http://packetstormsecurity.org/files/view/108272/wpcartpress-xss.txt", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://plugins.trac.wordpress.org/changeset/482746/thecartpress", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/47427", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/51216", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72070", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in admin/OptionsPostsList.php in the TheCartPress plugin for WordPress before 1.1.6 before 2011-12-31 allows remote attackers to inject arbitrary web script or HTML via the tcp_name_post_XXXXX parameter."}, {"lang": "es", "value": "Una vulnerabilidad de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en admin/OptionsPostsList.php en el plugin para WordPress TheCartPress antes de v1.1.6 anterior al 31/12/2011, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro tcp_name_post_XXXXX.\r\n"}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:thecartpress:thecartpress:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E067DF37-AE12-46D0-BBE5-CD9599ABF777", "versionEndIncluding": "1.1.6"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C811CCD4-7523-4F45-BA4E-5EE4A46B756B"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D307A836-4A2A-469A-8B69-ADB83A0AFA34"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F377591-A99A-48C4-AA26-2D9BC490D713"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7C534562-0C85-4811-AFCE-D00BDD73F306"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7CCB2A9-BAEE-4BD9-84DD-92FF8821E94F"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0A45B0E3-876E-4EEC-9FAC-526DC136681C"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "00FFED33-223C-4BFA-998E-01E7C5032A88"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54A11B7E-0AB6-4D95-9920-F7C8750FD7FE"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82C1B00A-90AD-47B0-9055-D822AF20E7B7"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA5864DC-0B31-4AF9-A72A-4F544BD090E5"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D56D45B-D547-4CE6-A374-88E6969AB318"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE6F1CF1-017D-46C1-ACB5-588B788A4AA3"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54199236-5473-4785-9D28-2A22FCC6301E"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "80A4292F-D9E0-4A83-9FB1-BC136BC069F6"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57C2C8E4-4F8E-4389-BB49-68CF46262A33"}, {"criteria": "cpe:2.3:a:thecartpress:thecartpress:1.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5CD8FEF8-E5A2-47F3-9CF0-13D8617C1AF1"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wordpress:wordpress:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A77EB0E7-7FA7-4232-97DF-7C7587D163F1"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "cve@mitre.org"}