FKIE_CVE-2011-4803
Vulnerability from fkie_nvd - Published: 2011-12-14 00:55 - Updated: 2026-04-29 01:13
Severity ?
Summary
SQL injection vulnerability in wptouch/ajax.php in the WPTouch plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5BFD0DB2-7A64-4698-8DA9-380769BBC25C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "95C6D2F2-FC4A-43EF-96B4-D84B6605471F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7AE81D83-0B96-4C02-B8FC-6E5231314E47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "F9722E64-6764-4F08-A412-1A7B4BA32A54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5A85EF16-7366-453F-B700-1DCCF9AC5912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9B209A18-07CF-4622-8DB2-36DB7D8F23E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D19BA277-CD29-43C9-840C-52684D72B12B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "61441A0F-C06C-4E71-91A6-4F9791CE1961",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.8.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B68756EE-828A-429C-8445-02D3D2E8A02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.8.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "319C88D4-0D4E-4B40-82F1-E28CE164B2AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DA2E855F-E94B-46B3-AFB2-05DBC029F297",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5490127F-7DB6-4565-B163-28FEC2564532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5D6384EA-0C4C-4157-B246-4E9ACDA7BC76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "52850683-EB92-46DC-B955-3305D1E90C42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB08B929-AA93-473F-8383-657B47271C6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D2D942FA-E789-4AF7-B795-741AF0265817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "74C1017A-2E48-4215-BF3F-E847A6BE6FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B0234C49-D383-40F3-8E5A-1666FABF0988",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AC2C350A-0C8D-46D0-9A2A-9BDEF8F8405E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.8.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A426DE5B-56F5-47B2-A47F-3B8F554D5943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F782D6-9F13-4842-87F6-A6A9BBEF1F15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A128B18B-6110-426F-89B8-5A72B1FAEB29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5AE5DD1A-9D1E-4923-A015-298B76EF4B36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.3:*:*:*:*:*:*:*",
"matchCriteriaId": "28A2BE4A-4427-4B62-AB5A-6D3CE95A55C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD2D3D8-6E10-43E8-A9CC-AC3AA782ED66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.5:*:*:*:*:*:*:*",
"matchCriteriaId": "672E59AF-76C9-404A-9DB4-0E247A696454",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C49BFDCF-E968-4233-87D6-320BE74C263C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.7:*:*:*:*:*:*:*",
"matchCriteriaId": "886EF0E0-93AC-46EA-8149-11FC45E8DB46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.9.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DDEE1523-A5A9-4A7B-8FD1-919D2BF7C24F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C37834DA-BD73-49AE-9CD2-276AB1003FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6DB1911C-88E5-4006-879D-D886320E258D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.12:*:*:*:*:*:*:*",
"matchCriteriaId": "ED2FDE64-7FC3-4B24-A1F9-6103381E84A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.13:*:*:*:*:*:*:*",
"matchCriteriaId": "61935681-AC3B-42F1-9306-4C6F88551590",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.14:*:*:*:*:*:*:*",
"matchCriteriaId": "B0E27227-37CA-4F31-8484-38CFC116BEEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F4019E17-FF95-4B9A-A059-3025E6949217",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FBDBC2E8-1F9C-487D-BC42-4D7FB1E490B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.17:*:*:*:*:*:*:*",
"matchCriteriaId": "AE4EA9CD-91AC-456E-B193-896A50301392",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.18:*:*:*:*:*:*:*",
"matchCriteriaId": "98854719-8862-4320-AC83-7F6AF6438B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19:*:*:*:*:*:*:*",
"matchCriteriaId": "FA0163E0-AACB-469D-9931-2D6FABCEA605",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF755C9-05A7-46CA-90E5-8112DA01A746",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "28F207FD-F893-45AD-8B36-ACDA9B422A14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E24CEE7F-42B9-48BB-A721-2DB3C4B28C98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D879A2-131B-4331-8F32-6DBD542F89AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.19.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6FC6C5AD-6244-4697-AA82-97601B104B9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.20:*:*:*:*:*:*:*",
"matchCriteriaId": "0748FB18-8E4B-4DED-9848-9CA6F1F4BBEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E04ECB17-A65E-4DB2-9A3B-14CDEA997584",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86F009F6-5722-41BE-B5BD-EDEBCE3A11F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.22:*:*:*:*:*:*:*",
"matchCriteriaId": "D57EDD99-DB18-43D5-9C91-EAF4C2509A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "196734D5-651C-487F-98F4-1416BF9CA0E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.23:*:*:*:*:*:*:*",
"matchCriteriaId": "DF44C087-DF67-4926-AAC1-C2A0DDC61027",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.24:*:*:*:*:*:*:*",
"matchCriteriaId": "484C3F5C-8CF4-4BB2-A329-6D5C34B51D42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.25:*:*:*:*:*:*:*",
"matchCriteriaId": "AF74C5D0-DA54-4242-9116-21B802C3ACFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:bravenewcode:wptouch:1.9.26:*:*:*:*:*:*:*",
"matchCriteriaId": "06771888-4352-4F57-A5EE-32E51C94786E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"matchCriteriaId": "847DA578-4655-477E-8A6F-99FBE738E4F9",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in wptouch/ajax.php in the WPTouch plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en wptouch/ajax.php en el complemento WPTouch para WordPress, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro id"
}
],
"id": "CVE-2011-4803",
"lastModified": "2026-04-29T01:13:23.040",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-12-14T00:55:04.607",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/18039"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://www.exploit-db.com/exploits/18039"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…