FKIE_CVE-2014-7959
Vulnerability from fkie_nvd - Published: 2014-11-06 15:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
SQL injection vulnerability in admin/htaccess/bpsunlock.php in the BulletProof Security plugin before .51.1 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the tableprefix parameter.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html | Exploit, Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/533904/100/0/threaded | Third Party Advisory, VDB Entry | |
| cve@mitre.org | http://www.securityfocus.com/bid/70918 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://wordpress.org/plugins/bulletproof-security/changelog/ | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533904/100/0/threaded | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/70918 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://wordpress.org/plugins/bulletproof-security/changelog/ | Patch, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.44:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "3B9C33AA-12CC-4D42-8434-A21A970712A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.44.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "2D477EAD-56ED-484C-9EC9-807D71FF132A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "23E8D7C5-C7CE-4592-9845-D8ED2EA26E86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "27850F39-002B-4B27-A360-904F6948D9AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B2C43712-B51B-400B-87CB-A0ABE649A873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5F8DBF45-32A3-4653-8EE7-60462FA9D3DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5A7783B6-B046-4F65-A88D-4004C2354191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "0CCBC995-7EB8-40EA-A0D2-A4AB08E1E6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "551056EE-F1B1-41EF-A6BE-22C865759C73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5D38E934-276C-4BA5-B741-AABB723522DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D438D78F-9B8A-48B1-A98E-63F369079CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.45.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "61DD5B82-5490-4F51-8519-94B275C80A62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "2B412149-36D2-46D7-88FD-D946973E66D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "2AD3C425-50CC-4580-AAFF-D9CDF7A8CDCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "67866096-905F-4268-ADA5-63DE2E2BC91E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "167E8C59-9DD6-4EA1-9C59-B7A72AA5CC4E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "4EF2CF91-23A2-49FB-AB76-1CFEA3189CEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "945130CD-0FC6-408A-9504-B9AE50FC1719",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F31E508F-028F-4654-8B6D-060B9CAA6F29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "2C5E0C2D-2F9A-48B2-B2C8-8BD0ED121A9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5E934145-72E5-48FF-AD4D-E9EC4D74AFF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.46.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "C0DF6386-85BF-4695-878E-8340F5CC7368",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "5B5401DF-F5A3-427F-B225-3765C3F8AF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BD9CCB62-8913-4BD8-94A2-1E795909C994",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7338666F-3FC9-4DE3-AD41-9013025E9ABE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6171FDC9-0132-474B-B23B-D95213605DD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "4458E0A1-A43D-49CE-91CF-AA53FD548EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "DF2CB32E-FD76-4461-942F-6FE83E3CA117",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D7555FD0-1691-4A9A-8090-F65C59118340",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "B0E76D29-7AE8-48A3-BA00-D31C9F46A14E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "993E79E7-1ADF-48FA-943A-8A0C058CE776",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.47.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "1EAC4337-824E-4C2A-8FCB-B3AEC2CA4BD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "7D7CCB40-A153-4BBD-8127-63D0B3746BA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "071D7A42-7A56-4DF8-8396-6483679CC27B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "16D4D906-4800-4C25-8732-E5951EE4A0F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "ECA6F32A-D7A5-4BD1-9BBD-59C72A9375E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "919AB4CB-1927-464C-A6C8-C78522A407F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "4EB14C36-C0B2-41E8-A40D-EBB30BDFBF5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "592BC8CA-3FFC-43F3-8421-29AB867BB69B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "00E8EED5-B1EF-49F6-BE60-7F27A95B424E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D083B6D1-67F4-45F3-9185-2595BF4A024C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.48.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E70A7618-530E-4FDC-9E58-B01BFC815042",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "A495DEB5-E485-4D01-860C-49103FCD8689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "F7A662D9-694F-45D9-A9A6-8AB52A20661B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BA5C0283-7D37-4B49-9CF0-18CB46B08B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "D48536AD-8EBC-421C-9603-A68AE9025CF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "9587C29A-2B24-4093-AE8B-B0ED26E680EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "9E5B41BB-6377-4716-B0A6-A6B449F2ED87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "469B34E4-E097-497D-8969-4AC4D26EBA26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "53F9AE5E-9F8D-4BFD-8FDE-D9AB7D38BFA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "0C30FB62-C7FE-4A1C-8CE4-3B48ADE1D93F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.49.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "6A74EED9-7F36-4EB5-A568-33F0073F45DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "59A0C040-908D-43EF-9D57-4F0DCA91389A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.1:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E061F000-A8E0-4D98-8333-07981A870D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.2:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "DE3862FB-8B7D-480E-AA2A-C682795691A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.3:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "96BB5796-BC2A-4EC9-B341-A27EFCCB1782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.4:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "E25F7569-5222-4B14-8F75-BFA836A67EBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.5:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "2B55644C-5481-462B-984C-A52C4BC4EEF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.6:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "31D93C98-42B4-444C-8855-DF99888D3DD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.7:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "065FCF06-6340-4E85-9C3C-E46044518399",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.8:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "AE844D07-910F-44B8-81ED-EB600FD26811",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.50.9:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "FED20689-FBFB-40B0-859D-72D26AB907BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ait-pro:bulletproof_security:.51:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "453C7575-AEFC-4064-89FF-2EF9D0E7CCA2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL injection vulnerability in admin/htaccess/bpsunlock.php in the BulletProof Security plugin before .51.1 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the tableprefix parameter."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n SQL en admin/htaccess/bpsunlock.php en el plugin BulletProof Security anterior a .51.1 para WordPress permite a usuarios remotos autenticados ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro tableprefix."
}
],
"id": "CVE-2014-7959",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-11-06T15:55:08.977",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/533904/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/70918"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://wordpress.org/plugins/bulletproof-security/changelog/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128977/WordPress-Bulletproof-Security-.51-XSS-SQL-Injection-SSRF.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/533904/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/70918"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://wordpress.org/plugins/bulletproof-security/changelog/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-89"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…