{"api_version":"1","generated_at":"2026-04-25T16:46:38+00:00","cve":"CVE-2012-10014","urls":{"html":"https://cve.report/CVE-2012-10014","api":"https://cve.report/api/cve/CVE-2012-10014.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2012-10014","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2012-10014"},"summary":{"title":"CVE-2012-10014","description":"A vulnerability classified as problematic has been found in Kau-Boy Backend Localization Plugin 2.0 on WordPress. Affected is the function backend_localization_admin_settings/backend_localization_save_setting/backend_localization_login_form/localize_backend of the file backend_localization.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 36f457ee16dd114e510fd91a3ea9fbb3c1f87184. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227232.","state":"PUBLIC","assigner":"cna@vuldb.com","published_at":"2023-04-24 18:15:00","updated_at":"2023-11-07 02:10:00"},"problem_types":["CWE-79"],"metrics":[],"references":[{"url":"https://vuldb.com/?ctiid.227232","name":"https://vuldb.com/?ctiid.227232","refsource":"MISC","tags":[],"title":"Login required","mime":"text/html","httpstatus":"401","archivestatus":"404"},{"url":"https://vuldb.com/?id.227232","name":"https://vuldb.com/?id.227232","refsource":"MISC","tags":[],"title":"CVE-2012-10014: Kau-Boy Backend Localization Plugin backend_localization.php localize_backend cross site scripting","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/wp-plugins/kau-boys-backend-localization/releases/tag/2.0.1","name":"https://github.com/wp-plugins/kau-boys-backend-localization/releases/tag/2.0.1","refsource":"MISC","tags":[],"title":"Release 2.0.1: fixing stable tag · wp-plugins/kau-boys-backend-localization · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/wp-plugins/kau-boys-backend-localization/commit/36f457ee16dd114e510fd91a3ea9fbb3c1f87184","name":"https://github.com/wp-plugins/kau-boys-backend-localization/commit/36f457ee16dd114e510fd91a3ea9fbb3c1f87184","refsource":"MISC","tags":[],"title":"Adding version 2.0: Fixing shown language in the switching message. U… · wp-plugins/kau-boys-backend-localization@36f457e · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2012-10014","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2012-10014","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2012","cve_id":"10014","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"kau-boys","cpe5":"backend_localization","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2012-10014","ASSIGNER":"cna@vuldb.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A vulnerability classified as problematic has been found in Kau-Boy Backend Localization Plugin 2.0 on WordPress. Affected is the function backend_localization_admin_settings/backend_localization_save_setting/backend_localization_login_form/localize_backend of the file backend_localization.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. Upgrading to version 2.0.1 is able to address this issue. The name of the patch is 36f457ee16dd114e510fd91a3ea9fbb3c1f87184. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-227232."},{"lang":"deu","value":"Es wurde eine problematische Schwachstelle in Kau-Boy Backend Localization Plugin 2.0 für WordPress entdeckt. Es geht dabei um die Funktion backend_localization_admin_settings/backend_localization_save_setting/backend_localization_login_form/localize_backend der Datei backend_localization.php. Mittels dem Manipulieren mit unbekannten Daten kann eine cross site scripting-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Ein Aktualisieren auf die Version 2.0.1 vermag dieses Problem zu lösen. Der Patch wird als 36f457ee16dd114e510fd91a3ea9fbb3c1f87184 bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross Site Scripting","cweId":"CWE-79"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Kau-Boy","product":{"product_data":[{"product_name":"Backend Localization Plugin","version":{"version_data":[{"version_affected":"=","version_value":"2.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://vuldb.com/?id.227232","refsource":"MISC","name":"https://vuldb.com/?id.227232"},{"url":"https://vuldb.com/?ctiid.227232","refsource":"MISC","name":"https://vuldb.com/?ctiid.227232"},{"url":"https://github.com/wp-plugins/kau-boys-backend-localization/commit/36f457ee16dd114e510fd91a3ea9fbb3c1f87184","refsource":"MISC","name":"https://github.com/wp-plugins/kau-boys-backend-localization/commit/36f457ee16dd114e510fd91a3ea9fbb3c1f87184"},{"url":"https://github.com/wp-plugins/kau-boys-backend-localization/releases/tag/2.0.1","refsource":"MISC","name":"https://github.com/wp-plugins/kau-boys-backend-localization/releases/tag/2.0.1"}]},"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer"}],"impact":{"cvss":[{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N","baseSeverity":"LOW"},{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N"}]}},"nvd":{"publishedDate":"2023-04-24 18:15:00","lastModifiedDate":"2023-11-07 02:10:00","problem_types":["CWE-79"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE","baseScore":6.1,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":2.7}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:kau-boys:backend_localization:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.0.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}