CVE-2012-1010

AllWebMenus <1.1.8 - Code Injection

Title source: llm
STIX 2.1

Description

Unrestricted file upload vulnerability in actions.php in the AllWebMenus plugin before 1.1.8 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Exploits (1)

exploitdb WORKING POC
by 6Scan · textwebappsphp
https://www.exploit-db.com/exploits/18407

References (6)

Core 6
Core References
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18407
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/51615
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72640
Exploit mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47659

Scores

EPSS 0.0868
EPSS Percentile 92.5%

Details

CWE
CWE-20
Status published
Products (22)
likno/allwebmenus_plugin 1.0.1
likno/allwebmenus_plugin 1.0.3
likno/allwebmenus_plugin 1.0.4
likno/allwebmenus_plugin 1.0.9
likno/allwebmenus_plugin 1.0.10
likno/allwebmenus_plugin 1.0.11
likno/allwebmenus_plugin 1.0.12
likno/allwebmenus_plugin 1.0.17
likno/allwebmenus_plugin 1.0.18
likno/allwebmenus_plugin 1.0.19
... and 12 more
Published Feb 07, 2012
Tracked Since Feb 18, 2026