CVE-2012-1011

AllWebMenus 1.1.8 - Auth Bypass

Title source: llm
STIX 2.1

Description

actions.php in the AllWebMenus plugin 1.1.8 for WordPress allows remote attackers to bypass intended access restrictions to upload and execute arbitrary PHP code by setting the HTTP_REFERER to a certain value, then uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory.

Exploits (1)

exploitdb WORKING POC
by 6Scan · textwebappsphp
https://www.exploit-db.com/exploits/18407

References (6)

Core 6
Core References
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18407
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/51615
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/72640
Exploit mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/47659

Scores

EPSS 0.0766
EPSS Percentile 91.9%

Details

CWE
CWE-264
Status published
Products (1)
likno/allwebmenus_plugin 1.1.8
Published Feb 07, 2012
Tracked Since Feb 18, 2026