{"api_version":"1","generated_at":"2026-04-23T23:08:51+00:00","cve":"CVE-2015-2292","urls":{"html":"https://cve.report/CVE-2015-2292","api":"https://cve.report/api/cve/CVE-2015-2292.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2015-2292","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2015-2292"},"summary":{"title":"CVE-2015-2292","description":"Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php.  NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2015-03-17 15:59:00","updated_at":"2016-12-03 03:04:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"http://www.securitytracker.com/id/1031920","name":"1031920","refsource":"SECTRACK","tags":["Exploit"],"title":"Yoast WordPress SEO WordPress Plugin Access Control Flaw Lets Remote Users Conduct Cross-Site Request Forgery Attacks - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html","name":"http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html","refsource":"MISC","tags":["Exploit"],"title":"WordPress SEO By Yoast 1.7.3.3 SQL Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wordpress.org/plugins/wordpress-seo/changelog/","name":"https://wordpress.org/plugins/wordpress-seo/changelog/","refsource":"CONFIRM","tags":[],"title":"WordPress › WordPress SEO by Yoast « WordPress Plugins","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/36413/","name":"36413","refsource":"EXPLOIT-DB","tags":[],"title":"WordPress SEO by Yoast 1.7.3.3 - Blind SQL Injection","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2015/Mar/73","name":"20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection","refsource":"FULLDISC","tags":["Exploit"],"title":"Full Disclosure: WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://wpvulndb.com/vulnerabilities/7841","name":"https://wpvulndb.com/vulnerabilities/7841","refsource":"MISC","tags":["Exploit"],"title":"WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://yoast.com/wordpress-seo-security-release/","name":"https://yoast.com/wordpress-seo-security-release/","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"WordPress SEO Security release • Yoast","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2015-2292","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2015-2292","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.6.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"1.7.3.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"},{"cve_year":"2015","cve_id":"2292","vulnerable":"1","versionEndIncluding":"1.5.6","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"yoast","cpe5":"wordpress_seo","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2015-2292","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php.  NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"https://wpvulndb.com/vulnerabilities/7841","refsource":"MISC","url":"https://wpvulndb.com/vulnerabilities/7841"},{"name":"http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/130811/WordPress-SEO-By-Yoast-1.7.3.3-SQL-Injection.html"},{"name":"https://yoast.com/wordpress-seo-security-release/","refsource":"CONFIRM","url":"https://yoast.com/wordpress-seo-security-release/"},{"name":"36413","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/36413/"},{"name":"https://wordpress.org/plugins/wordpress-seo/changelog/","refsource":"CONFIRM","url":"https://wordpress.org/plugins/wordpress-seo/changelog/"},{"name":"20150312 WordPress SEO by Yoast <= 1.7.3.3 - Blind SQL Injection","refsource":"FULLDISC","url":"http://seclists.org/fulldisclosure/2015/Mar/73"},{"name":"1031920","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1031920"}]}},"nvd":{"publishedDate":"2015-03-17 15:59:00","lastModifiedDate":"2016-12-03 03:04:00","problem_types":["CWE-89"],"metrics":{"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6.5},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.7.2:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.7.1:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:*:*:*:*:*:wordpress:*:*","versionEndIncluding":"1.5.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.7.3:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.6.1:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.7.3.1:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.6.2:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.7.3.3:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.6.0:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.6.3:*:*:*:*:wordpress:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:yoast:wordpress_seo:1.7.3.2:*:*:*:*:wordpress:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2015","CveId":"2292","Ordinal":"79223","Title":"CVE-2015-2292","CVE":"CVE-2015-2292","Year":"2015"},"notes":[{"CveYear":"2015","CveId":"2292","Ordinal":"1","NoteData":"Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php.  NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands.","Type":"Description","Title":null},{"CveYear":"2015","CveId":"2292","Ordinal":"2","NoteData":"2015-03-17","Type":"Other","Title":"Published"},{"CveYear":"2015","CveId":"2292","Ordinal":"3","NoteData":"2016-11-30","Type":"Other","Title":"Modified"}]}}}