Show plain JSON{"id": "CVE-2013-3250", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.8, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2013-06-21T20:55:01.053", "references": [{"url": "http://secunia.com/advisories/53125", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://wordpress.org/plugins/wp-maintenance-mode/changelog/", "source": "PSIRT-CNA@flexerasoftware.com"}, {"url": "http://secunia.com/advisories/53125", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://wordpress.org/plugins/wp-maintenance-mode/changelog/", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-352"}]}], "descriptions": [{"lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in the WP Maintenance Mode plugin before 1.8.8 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that modify this plugin's settings."}, {"lang": "es", "value": "M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en el plugin WP Maintenance Mode anterior a v1.8.8 para WordPress , permite a atacantes remotos secuestrar la autenticaci\u00f3n de los usuarios para solicitudes que modifican la configuraci\u00f3n de los plugins."}], "lastModified": "2024-11-21T01:53:16.397", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E136FEB1-CB0A-4C5A-B25E-DD906D530717", "versionEndIncluding": "1.8.7"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D100EAA-744F-4012-AB8C-A7CD4804892D"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "95EEB475-595A-4375-948A-026A94BB12B8"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "244BAC6A-0685-4C36-9D95-73CAA63D501B"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "065D170F-E681-4DD8-A4D6-E14B64F9FCBB"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AB7103DF-ED99-4D4A-913F-ECAB0EF07CBD"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A94D937-EB64-4DD4-83C0-70BF6162095B"}, {"criteria": "cpe:2.3:a:wordpress:wp_maintenance_mode_plugin:1.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3D0AA7A-4351-4CBB-85F2-FBBA2F8F1F07"}], "operator": "OR"}]}], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com"}