Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-gyaq-8pvh-p7gg
SummaryWordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions.
Aliases
0
alias CVE-2012-6707
Fixed_packages
0
url pkg:deb/debian/wordpress@6.8.1%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.1%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.1%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1
2
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4g2n-5v12-yuff
1
vulnerability VCID-532z-9qbb-dyfw
2
vulnerability VCID-gyaq-8pvh-p7gg
3
vulnerability VCID-jghn-eujf-zbdn
4
vulnerability VCID-m8mf-t2td-67h7
5
vulnerability VCID-yqam-kpce-dfg7
6
vulnerability VCID-zj9a-shru-e7gs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2012-6707
reference_id
reference_type
scores
0
value 0.00182
scoring_system epss
scoring_elements 0.39508
published_at 2026-05-15T12:55:00Z
1
value 0.00182
scoring_system epss
scoring_elements 0.39497
published_at 2026-05-14T12:55:00Z
2
value 0.00182
scoring_system epss
scoring_elements 0.39744
published_at 2026-04-01T12:55:00Z
3
value 0.00182
scoring_system epss
scoring_elements 0.39893
published_at 2026-04-02T12:55:00Z
4
value 0.00182
scoring_system epss
scoring_elements 0.39921
published_at 2026-04-11T12:55:00Z
5
value 0.00182
scoring_system epss
scoring_elements 0.39843
published_at 2026-04-07T12:55:00Z
6
value 0.00182
scoring_system epss
scoring_elements 0.39899
published_at 2026-04-08T12:55:00Z
7
value 0.00182
scoring_system epss
scoring_elements 0.39912
published_at 2026-04-09T12:55:00Z
8
value 0.00182
scoring_system epss
scoring_elements 0.39886
published_at 2026-04-12T12:55:00Z
9
value 0.00182
scoring_system epss
scoring_elements 0.39867
published_at 2026-04-13T12:55:00Z
10
value 0.00182
scoring_system epss
scoring_elements 0.39917
published_at 2026-04-16T12:55:00Z
11
value 0.00182
scoring_system epss
scoring_elements 0.39887
published_at 2026-04-18T12:55:00Z
12
value 0.00182
scoring_system epss
scoring_elements 0.39807
published_at 2026-04-21T12:55:00Z
13
value 0.00182
scoring_system epss
scoring_elements 0.39633
published_at 2026-04-24T12:55:00Z
14
value 0.00182
scoring_system epss
scoring_elements 0.39619
published_at 2026-04-26T12:55:00Z
15
value 0.00182
scoring_system epss
scoring_elements 0.39533
published_at 2026-04-29T12:55:00Z
16
value 0.00182
scoring_system epss
scoring_elements 0.39406
published_at 2026-05-05T12:55:00Z
17
value 0.00182
scoring_system epss
scoring_elements 0.39472
published_at 2026-05-07T12:55:00Z
18
value 0.00182
scoring_system epss
scoring_elements 0.39488
published_at 2026-05-09T12:55:00Z
19
value 0.00182
scoring_system epss
scoring_elements 0.39401
published_at 2026-05-11T12:55:00Z
20
value 0.00182
scoring_system epss
scoring_elements 0.39426
published_at 2026-05-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2012-6707
1
reference_url https://core.trac.wordpress.org/ticket/21022
reference_id
reference_type
scores
url https://core.trac.wordpress.org/ticket/21022
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6707
3
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880868
reference_id 880868
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=880868
4
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_id cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2012-6707
reference_id CVE-2012-6707
reference_type
scores
0
value 5.0
scoring_system cvssv2
scoring_elements AV:N/AC:L/Au:N/C:P/I:N/A:N
1
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://nvd.nist.gov/vuln/detail/CVE-2012-6707
Weaknesses
0
cwe_id 326
name Inadequate Encryption Strength
description The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
Exploits
Severity_range_score5.0 - 7.5
Exploitability0.5
Weighted_severity6.8
Risk_score3.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-gyaq-8pvh-p7gg