FKIE_CVE-2012-6625

Vulnerability from fkie_nvd - Published: 2014-01-16 21:55 - Updated: 2026-04-29 01:13
Severity ?
Summary
SQL injection vulnerability in fs-admin/fs-admin.php in the ForumPress WP Forum Server plugin before 1.7.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the groupid parameter in an editgroup action.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:*:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "7DE1FCA6-0FFB-4E21-89EB-67DEB207A160",
              "versionEndIncluding": "1.7.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.0:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "ED0011BC-EC52-4A41-A100-163B27446558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.1:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "091F53B6-D32E-4DEE-8D02-F775868648E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.2:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "CD493B30-DCB9-4FAC-9441-CACD70F59353",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.3:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "B697EF72-29AD-4059-BF71-F49EA23CB8ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.4:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "25E04C3F-C0E8-4BAF-9DAE-1D3119CB58F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.5:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "B3C27AA1-5DAC-4496-A05A-D5E18A623D02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.5.1:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "B9A27934-D2F3-45FD-B9F1-AB2EF356EEDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.5.2:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "FD94030B-FD8B-412F-8896-E2C8AF4F2122",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "41000CAF-A103-4BC8-94ED-22741F161F12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.2:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "31697454-8FE4-4555-BABE-F1C4A0C01EA2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.3:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "5C75483E-FD07-412C-9722-8135658A9AAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.4:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "9EE9DEF1-430E-4CD4-9DF4-CAFE97D425E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.5:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "7F06D316-C303-4673-BA8C-16DC19ED7BB1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.6:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "1865B793-170B-49D7-A788-0758391C2C4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.7:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "2970E25D-32AB-4DED-B573-AE296E3ABFC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.8:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "3AA6E04D-50FB-45D0-BD28-154307BE3444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.6.9:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "3EE637AB-E282-494A-AC56-0893FF296A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.7:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "475293DD-1D29-460A-8891-20C6DAC69F5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.7.1:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "93292F02-BCC9-4C19-961E-03A3056DC6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.7.2:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "4196969E-0797-4DD4-B790-877ABD3BA708",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vasthtml:forumpress:1.7.3:-:-:*:-:wordpress:*:*",
              "matchCriteriaId": "8D6E6667-8609-407D-A40A-7C5423B60243",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in fs-admin/fs-admin.php in the ForumPress WP Forum Server plugin before 1.7.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the groupid parameter in an editgroup action."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n de SQL en fs-admin/fs-admin.php en el plugin ForumPress WP Forum Server anterior a la versi\u00f3n 1.7.4 para WordPress permite a atacantes remotos ejecutar comandos de SQL arbitrarios a trav\u00e9s del par\u00e1metro groupid en una acci\u00f3n editgroup."
    }
  ],
  "id": "CVE-2012-6625",
  "lastModified": "2026-04-29T01:13:23.040",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-16T21:55:44.550",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/extend/plugins/forum-server/changelog/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/53530"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://plugins.trac.wordpress.org/changeset/532918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.org/files/112703/WordPress-WP-Forum-Server-1.7.3-SQL-Injection-Cross-Site-Scripting.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/extend/plugins/forum-server/changelog/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/53530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://plugins.trac.wordpress.org/changeset/532918"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.

Sightings

Author Source Type Date Other

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…