Multiple vulnerabilities in WordPress March 15, 2013

Posted: March 15, 2013 in Vulnerabilities
Tags: , , , ,

WordPress vulnerabilities

WordPress vulnerabilities

Vulnerability: Security Bypass WordPress MailUp

Danger level: Avarage
Patch: None
Number of vulnerabilities: 1

CVE ID: CVE-2013-0731
Vector of operation: Remote
Impact: Security Bypass

Affected products: WordPress MailUp Plugin 1.x

Affected versions: WordPress MailUp 1.3.2, perhaps the only one.


Which can be exploited by malicious people to bypass certain security restrictions.

The vulnerability is caused due to the application improperly restrict access to certain functions in the script wp-content/plugins/wp-mailup/ajax.functions.php (when cookies “wordpress_logged_in_test” set.) This can be exploited to bypass security restrictions and manipulate specific application settings.

Manufacturer URL:

Solution: The way to eliminate the vulnerability does not exist at present.

Vulnerability: Cross-site scripting WordPress podPress

Danger level: Low
Availability of fixes: Insturktsii to eliminate
Number of vulnerabilities: 1

Vector of operation: Remote
Impact: Cross Site Scripting

Affected products: WordPress podPress Plugin 8.x

Affected versions: WordPress podPress, possibly earlier.


The vulnerability allows malicious people to conduct XSS attacks.

The vulnerability is caused due to insufficient input validation in the parameter “playerID” in script wp-content/plugins/podpress/players/1pixelout/1pixelout_player.swf. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

Manufacturer URL:

Solution: Install the latest version from the SVN repository.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s