{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:18:26.042","vulnerabilities":[{"cve":{"id":"CVE-2012-1010","sourceIdentifier":"cve@mitre.org","published":"2012-02-07T21:55:04.250","lastModified":"2025-04-11T00:51:21.963","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Unrestricted file upload vulnerability in actions.php in the AllWebMenus plugin before 1.1.8 for WordPress allows remote attackers to execute arbitrary PHP code by uploading a ZIP file containing a PHP file, then accessing it via a direct request to the file in an unspecified directory."},{"lang":"es","value":"Subida de ficheros sin restricción en actions.php en el complemento AllWebMenus antes de v1.1.8 para WordPress, permite a atacantes remotos ejecutar código PHP de su elección subiendo un archivo ZIP que contenga el archivo PHP y accediendo a este a través de una petición directa al archivo en un directorio no especificado."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1.7","matchCriteriaId":"40D02700-CA22-4326-BE85-FFB014BF722C"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F6996004-21F8-4261-81DA-C91E38E657FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"3A996F53-7122-4F06-8AC8-9DAB4047D6B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.4:*:*:*:*:*:*:*","matchCriteriaId":"DF7EDEB6-B70F-49BB-AA7D-3A4C07D878CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.9:*:*:*:*:*:*:*","matchCriteriaId":"2950A27D-477E-49C3-BF69-E1597D30B37B"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.10:*:*:*:*:*:*:*","matchCriteriaId":"099D2A66-AA14-4BF9-A130-8239488FD7C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.11:*:*:*:*:*:*:*","matchCriteriaId":"1B74FD70-505F-498C-905F-F0CA238BA2FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.12:*:*:*:*:*:*:*","matchCriteriaId":"17FCD4FC-3579-47FA-B114-2FC76FB2BF31"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.17:*:*:*:*:*:*:*","matchCriteriaId":"BE145B19-80A8-48FC-9177-694823B42C1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.18:*:*:*:*:*:*:*","matchCriteriaId":"4B310AB7-204F-4CA0-A0AB-8C7F578DF726"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.19:*:*:*:*:*:*:*","matchCriteriaId":"AA11EDF0-52F9-474F-A4A0-759383679176"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.20:*:*:*:*:*:*:*","matchCriteriaId":"68F51D2D-D525-4893-81DB-1A12BA4A1497"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.21:*:*:*:*:*:*:*","matchCriteriaId":"2B4030BF-41CD-40E3-8FB9-BFA8B7E7D5C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.22:*:*:*:*:*:*:*","matchCriteriaId":"8E7C690E-360A-4662-BF1C-FCE0E23AEB83"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.23:*:*:*:*:*:*:*","matchCriteriaId":"B5F238F4-63E9-4417-BECC-D44CFF38E7EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.0.24:*:*:*:*:*:*:*","matchCriteriaId":"A732E139-B375-47D5-8EAC-3C2821B9067D"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"A78F6F15-32DE-42DB-B45E-FC580048340E"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"DA65E81E-17D3-4206-B9F4-65913427CB1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.1.3:*:*:*:*:*:*:*","matchCriteriaId":"CB679CB0-35E7-42EB-9014-81BB75C624D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"4C78156C-7D10-4B34-925A-10A82A29FCE3"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.1.5:*:*:*:*:*:*:*","matchCriteriaId":"D31A9692-1A83-4F9D-B153-12F6F9151DB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:likno:allwebmenus_plugin:1.1.6:*:*:*:*:*:*:*","matchCriteriaId":"4CFAD42A-D78D-43E6-8462-CAD782C12F7E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*","matchCriteriaId":"847DA578-4655-477E-8A6F-99FBE738E4F9"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://secunia.com/advisories/47659","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/","source":"cve@mitre.org"},{"url":"http://www.exploit-db.com/exploits/18407","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/51615","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72640","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2012-01/0137.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://secunia.com/advisories/47659","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://wordpress.org/extend/plugins/allwebmenus-wordpress-menu-plugin/changelog/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.exploit-db.com/exploits/18407","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/51615","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72640","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}