Search criteria

30 vulnerabilities found for wordpress_mu by wordpress

FKIE_CVE-2009-2334

Vulnerability from fkie_nvd - Published: 2009-07-10 21:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.
References
cve@mitre.orghttp://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_UncheckedExploit
cve@mitre.orghttp://securitytracker.com/id?1022528
cve@mitre.orghttp://wordpress.org/development/2009/07/wordpress-2-8-1/Vendor Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1871
cve@mitre.orghttp://www.exploit-db.com/exploits/9110
cve@mitre.orghttp://www.osvdb.org/55712Exploit, Patch
cve@mitre.orghttp://www.osvdb.org/55715Patch
cve@mitre.orghttp://www.securityfocus.com/archive/1/504795/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/35584Exploit, Patch
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1833Patch, Vendor Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html
af854a3a-2127-422b-91ae-364da2661108http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_UncheckedExploit
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1022528
af854a3a-2127-422b-91ae-364da2661108http://wordpress.org/development/2009/07/wordpress-2-8-1/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1871
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/9110
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/55712Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/55715Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/504795/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35584Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1833Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress 0.6.2
wordpress wordpress 0.6.2
wordpress wordpress 0.6.2.1
wordpress wordpress 0.6.2.1
wordpress wordpress 0.7
wordpress wordpress 0.71
wordpress wordpress 0.71-gold
wordpress wordpress 0.72
wordpress wordpress 0.72
wordpress wordpress 0.72
wordpress wordpress 0.72
wordpress wordpress 0.711
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0-platinum
wordpress wordpress 1.0.1
wordpress wordpress 1.0.1-miles
wordpress wordpress 1.0.2
wordpress wordpress 1.0.2-blakey
wordpress wordpress 1.2
wordpress wordpress 1.2
wordpress wordpress 1.2-delta
wordpress wordpress 1.2-mingus
wordpress wordpress 1.2.1
wordpress wordpress 1.2.2
wordpress wordpress 1.3.1
wordpress wordpress 1.4
wordpress wordpress 1.5
wordpress wordpress 1.5-strayhorn
wordpress wordpress 1.5.1
wordpress wordpress 1.5.1.1
wordpress wordpress 1.5.1.2
wordpress wordpress 1.5.1.3
wordpress wordpress 1.5.2
wordpress wordpress 1.6
wordpress wordpress 2.0
wordpress wordpress 2.0.1
wordpress wordpress 2.0.2
wordpress wordpress 2.0.3
wordpress wordpress 2.0.4
wordpress wordpress 2.0.5
wordpress wordpress 2.0.6
wordpress wordpress 2.0.7
wordpress wordpress 2.0.8
wordpress wordpress 2.0.9
wordpress wordpress 2.0.10
wordpress wordpress 2.0.10_rc1
wordpress wordpress 2.0.10_rc2
wordpress wordpress 2.0.11
wordpress wordpress 2.1
wordpress wordpress 2.1
wordpress wordpress 2.1.1
wordpress wordpress 2.1.2
wordpress wordpress 2.1.3
wordpress wordpress 2.1.3_rc1
wordpress wordpress 2.1.3_rc2
wordpress wordpress 2.2
wordpress wordpress 2.2.0
wordpress wordpress 2.2.1
wordpress wordpress 2.2.2
wordpress wordpress 2.2.3
wordpress wordpress 2.2_revision5002
wordpress wordpress 2.2_revision5003
wordpress wordpress 2.3
wordpress wordpress 2.3
wordpress wordpress 2.3
wordpress wordpress 2.3.1
wordpress wordpress 2.3.1
wordpress wordpress 2.3.2
wordpress wordpress 2.3.3
wordpress wordpress 2.5
wordpress wordpress 2.5.1
wordpress wordpress 2.6
wordpress wordpress 2.6.1
wordpress wordpress 2.6.3
wordpress wordpress 2.6.5
wordpress wordpress_mu *
wordpress wordpress_mu 1.1
wordpress wordpress_mu 1.1.1
wordpress wordpress_mu 1.2
wordpress wordpress_mu 1.2.1
wordpress wordpress_mu 1.2.2
wordpress wordpress_mu 1.2.3
wordpress wordpress_mu 1.2.4
wordpress wordpress_mu 1.2.4
wordpress wordpress_mu 1.2.5a
wordpress wordpress_mu 1.3
wordpress wordpress_mu 1.3.1
wordpress wordpress_mu 1.3.2
wordpress wordpress_mu 1.3.3
wordpress wordpress_mu 1.5
wordpress wordpress_mu 1.5.1
wordpress wordpress_mu 2.6
wordpress wordpress_mu 2.6.1
wordpress wordpress_mu 2.6.2
wordpress wordpress_mu 2.6.3
wordpress wordpress_mu 2.6.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68895399-32D7-43DE-945B-B9BD29DA5B13",
              "versionEndIncluding": "2.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FEB898B-BF80-44C1-A847-AC0062458B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "C3C33D37-2FFF-4DE5-B260-E090F4E6377B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70EF48-AD6C-4119-B7C4-67E889A2BB27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "3E4139FE-7C43-44AC-856F-226E1194D936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0395AD1D-3470-49EE-9F2A-349EF8782B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC499ABC-D1A6-4A9B-A06B-12C8275462DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F33ACD9-B4B6-4B5E-9CD5-26AA5997119C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "056E641C-9322-4BEE-97B4-FE16DE8D7336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "ADB42CEF-E12D-4DB0-8536-FD393D3697A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C4AF89F9-AE67-49B5-ACF0-3A645C454E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*",
              "matchCriteriaId": "0174AF4F-9759-4762-ACF4-688E232AF1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "90C9AFEE-BCD7-4B4D-8F22-98747524F17D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "175B2515-E212-4347-8C04-13E110D70C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BD571A4D-1D9C-4925-AE99-9128421213F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "7B553469-0D8B-48AD-8EFF-3DC469262977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE015E8-FDE1-47FA-B3E5-0DC2C0A5107D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*",
              "matchCriteriaId": "C516C041-B945-4992-8104-E20B3B6CECDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFBD4E49-EA17-4FFD-AF9C-950E542555A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0666BEBE-BE45-41D3-8C53-E4C9E6853C1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2F19C7-DD9A-4851-8788-E3E4E8CE8E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4229BC-1646-4202-92B8-FC718D557518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4FEB48-771B-4331-B42B-764F12A94B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "947635DB-A86E-45F0-B946-559202C49503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86BC4AC-62D0-47AA-8E81-50ED0B3CB88E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEABEFD-E248-42B7-B99E-FFDEE27F7064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF73E23-7CD0-429C-986B-5F721F1696BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D85664-E355-4A68-89EB-D5C9D0E6B916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91243043-F4A6-40EF-97FC-989ED366394C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*",
              "matchCriteriaId": "46B86AD1-967D-4C8E-BD31-C2A2197B1E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B0A9E4-9D09-4127-AF8B-4DA6D488E67C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C667FD-BA00-43B3-8313-5A24A2DFF55A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1D97C81-A053-4D73-BEA7-CBCB5FC0CC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC4F089-A606-4880-8C5D-24520B55CD14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F6724F-AC94-4D6B-BEB7-EF4683FD1A07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "94ADC624-E43E-4F1D-8525-F6903943C932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "06A25444-2680-4379-B2CA-9858B6AF71CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4801D56C-5ED6-4648-A0C9-EB4D06786A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F41AFB-596E-4FFA-AC46-E563122A9D2F",
              "versionEndIncluding": "2.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2912D04D-A004-4842-8EF0-B51DAAA5FD46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77286DE-D583-4359-8962-439583BE9BA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5ED66D3-5D12-42CE-8B98-6A2984DAC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB3E9E3-1341-4F34-B6D1-5DF9F3B1D1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EA81B6-0254-404D-8A2B-80C027383FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "738C3727-FCA0-4C7B-B6D6-2FC14987706A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8149192C-167C-4459-8C20-355DE0FF2921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EBC1B2B1-C8EE-47A4-BE44-CAC1A6CD432E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E6D03D-0547-4CAB-A1CF-AEAC82634437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5136FA-5060-4448-9874-3DF375467ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB8E4A4-818E-4FDF-8C83-7C8FB5C83909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F534621-ED5F-46D0-A893-D0C6DAACB0C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1930525-806B-49B1-A18E-189D41E5885C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "330826FD-833C-4BB4-8293-2812956496B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "555E7E8A-3632-416B-889E-68E98AABE8CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "75674DE5-229D-4359-B29C-E18BBC76E188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE70A19-919A-4478-B97B-EEF9FA29BECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70524981-C0ED-4915-B0F3-A9F5D4865A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9450D1-B817-4A38-A46F-05FCB6692A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA78384-3133-442A-B135-192440FB1745",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service."
    },
    {
      "lang": "es",
      "value": "wp-admin/admin.php en WordPress y WordPress MU antes de v2.8.1 no requiere autenticaci\u00f3n administrativa para acceder a la configuraci\u00f3n de un plugin, lo cual permite a atacantes remotos especificar un archivo de configuraci\u00f3n en la p\u00e1gina de par\u00e1metros para obtener informaci\u00f3n sensible o modificar este archivo, como se demostr\u00f3 por los ficheros (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, y (5) wp-ids/ids-admin.php. NOTA: esto puede ser aprovechados para vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) y denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2009-2334",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-10T21:00:00.187",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1871"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.exploit-db.com/exploits/9110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.osvdb.org/55712"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/55715"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35584"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.exploit-db.com/exploits/9110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.osvdb.org/55712"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/55715"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/35584"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-2336

Vulnerability from fkie_nvd - Published: 2009-07-10 21:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
References
cve@mitre.orghttp://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_UncheckedExploit, Patch, Third Party Advisory
cve@mitre.orghttp://securitytracker.com/id?1022528Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.exploit-db.com/exploits/9110Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.osvdb.org/55714Broken Link, Patch
cve@mitre.orghttp://www.securityfocus.com/archive/1/504795/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/35581Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1833Patch, Third Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.htmlThird Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.htmlThird Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.htmlThird Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_UncheckedExploit, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1022528Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/9110Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/55714Broken Link, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/504795/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35581Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1833Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.htmlThird Party Advisory
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress_mu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "513237CD-92E3-46CD-8221-88F36B243101",
              "versionEndExcluding": "2.8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1327C621-452A-4BA4-B2E7-28AE4533DCC1",
              "versionEndExcluding": "2.8.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
    },
    {
      "lang": "es",
      "value": "El interfaz de correo olvidado en WordPress y WordPress MU anterior a v2.8.1 muestra diferentes comportamientos para una petici\u00f3n de contrase\u00f1a dependiendo de si existe la cuenta de usuario, lo cual permite a atacantes remotos enumerar los nombres de usuario v\u00e1lidos. NOTA: el fabricante informa cuestionando la importancia de esta incidencia,indicando que este comportamiendo se da por conveniencia para el usuario."
    }
  ],
  "id": "CVE-2009-2336",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-10T21:00:00.233",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/9110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://www.osvdb.org/55714"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35581"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/9110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://www.osvdb.org/55714"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-2432

Vulnerability from fkie_nvd - Published: 2009-07-10 21:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress 0.6.2
wordpress wordpress 0.6.2
wordpress wordpress 0.6.2.1
wordpress wordpress 0.6.2.1
wordpress wordpress 0.7
wordpress wordpress 0.71
wordpress wordpress 0.71-gold
wordpress wordpress 0.72
wordpress wordpress 0.72
wordpress wordpress 0.72
wordpress wordpress 0.72
wordpress wordpress 0.711
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0
wordpress wordpress 1.0-platinum
wordpress wordpress 1.0.1
wordpress wordpress 1.0.1-miles
wordpress wordpress 1.0.2
wordpress wordpress 1.0.2-blakey
wordpress wordpress 1.2
wordpress wordpress 1.2
wordpress wordpress 1.2-delta
wordpress wordpress 1.2-mingus
wordpress wordpress 1.2.1
wordpress wordpress 1.2.2
wordpress wordpress 1.3.1
wordpress wordpress 1.4
wordpress wordpress 1.5
wordpress wordpress 1.5-strayhorn
wordpress wordpress 1.5.1
wordpress wordpress 1.5.1.1
wordpress wordpress 1.5.1.2
wordpress wordpress 1.5.1.3
wordpress wordpress 1.5.2
wordpress wordpress 1.6
wordpress wordpress 2.0
wordpress wordpress 2.0.1
wordpress wordpress 2.0.2
wordpress wordpress 2.0.3
wordpress wordpress 2.0.4
wordpress wordpress 2.0.5
wordpress wordpress 2.0.6
wordpress wordpress 2.0.7
wordpress wordpress 2.0.8
wordpress wordpress 2.0.9
wordpress wordpress 2.0.10
wordpress wordpress 2.0.10_rc1
wordpress wordpress 2.0.10_rc2
wordpress wordpress 2.0.11
wordpress wordpress 2.1
wordpress wordpress 2.1
wordpress wordpress 2.1.1
wordpress wordpress 2.1.2
wordpress wordpress 2.1.3
wordpress wordpress 2.1.3_rc1
wordpress wordpress 2.1.3_rc2
wordpress wordpress 2.2
wordpress wordpress 2.2.0
wordpress wordpress 2.2.1
wordpress wordpress 2.2.2
wordpress wordpress 2.2.3
wordpress wordpress 2.2_revision5002
wordpress wordpress 2.2_revision5003
wordpress wordpress 2.3
wordpress wordpress 2.3
wordpress wordpress 2.3
wordpress wordpress 2.3.1
wordpress wordpress 2.3.1
wordpress wordpress 2.3.2
wordpress wordpress 2.3.3
wordpress wordpress 2.5
wordpress wordpress 2.5.1
wordpress wordpress 2.6
wordpress wordpress 2.6.1
wordpress wordpress 2.6.3
wordpress wordpress 2.6.5
wordpress wordpress_mu *
wordpress wordpress_mu 1.1
wordpress wordpress_mu 1.1.1
wordpress wordpress_mu 1.2
wordpress wordpress_mu 1.2.1
wordpress wordpress_mu 1.2.2
wordpress wordpress_mu 1.2.3
wordpress wordpress_mu 1.2.4
wordpress wordpress_mu 1.2.4
wordpress wordpress_mu 1.2.5a
wordpress wordpress_mu 1.3
wordpress wordpress_mu 1.3.1
wordpress wordpress_mu 1.3.2
wordpress wordpress_mu 1.3.3
wordpress wordpress_mu 1.5
wordpress wordpress_mu 1.5.1
wordpress wordpress_mu 2.6
wordpress wordpress_mu 2.6.1
wordpress wordpress_mu 2.6.2
wordpress wordpress_mu 2.6.3
wordpress wordpress_mu 2.6.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "68895399-32D7-43DE-945B-B9BD29DA5B13",
              "versionEndIncluding": "2.7.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FEB898B-BF80-44C1-A847-AC0062458B58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "C3C33D37-2FFF-4DE5-B260-E090F4E6377B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70EF48-AD6C-4119-B7C4-67E889A2BB27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.6.2.1:beta_2:*:*:*:*:*:*",
              "matchCriteriaId": "3E4139FE-7C43-44AC-856F-226E1194D936",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "0395AD1D-3470-49EE-9F2A-349EF8782B40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C8B90E9-5DF5-45F5-9810-2973FDAA16A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.71-gold:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC499ABC-D1A6-4A9B-A06B-12C8275462DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F33ACD9-B4B6-4B5E-9CD5-26AA5997119C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "056E641C-9322-4BEE-97B4-FE16DE8D7336",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "ADB42CEF-E12D-4DB0-8536-FD393D3697A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.72:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C4AF89F9-AE67-49B5-ACF0-3A645C454E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:0.711:*:*:*:*:*:*:*",
              "matchCriteriaId": "0174AF4F-9759-4762-ACF4-688E232AF1EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D86BA1-3DC8-478C-B2FA-581F9AE1F93E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "90C9AFEE-BCD7-4B4D-8F22-98747524F17D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "175B2515-E212-4347-8C04-13E110D70C80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "BD571A4D-1D9C-4925-AE99-9128421213F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "7B553469-0D8B-48AD-8EFF-3DC469262977",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0-platinum:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEE015E8-FDE1-47FA-B3E5-0DC2C0A5107D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7BEFBD-4326-44A5-A160-9406D94AB307",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.1-miles:*:*:*:*:*:*:*",
              "matchCriteriaId": "C516C041-B945-4992-8104-E20B3B6CECDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E85A88D7-07A1-4A8C-88B5-057AD9C675E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.0.2-blakey:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFBD4E49-EA17-4FFD-AF9C-950E542555A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF1FE320-DF71-42EC-A0F0-300F7D6D4AB4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0666BEBE-BE45-41D3-8C53-E4C9E6853C1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2-delta:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F2F19C7-DD9A-4851-8788-E3E4E8CE8E79",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2-mingus:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C4229BC-1646-4202-92B8-FC718D557518",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B64D4777-2ED6-4A47-A8F3-38A3A8EB1ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "614956CB-0582-4EAD-86F4-5AB0BB781CE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A4FEB48-771B-4331-B42B-764F12A94B47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "947635DB-A86E-45F0-B946-559202C49503",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "503E4894-3F39-471F-9A56-052718813BF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5-strayhorn:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86BC4AC-62D0-47AA-8E81-50ED0B3CB88E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "38085E5A-7B41-4E43-8A22-5FD44970F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF628FB8-1AC4-4F15-9967-E60785A32D1A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0BF1F6-A54A-48E8-A872-015FE10E5D03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B6EAC-E43D-4D1B-856F-7C23250A2355",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FAD0FC-CE84-4332-B061-75C0C8A0B6AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AEABEFD-E248-42B7-B99E-FFDEE27F7064",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCFE9AA-39E9-4366-AAB7-F7A891BC797E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAF4671A-8449-438E-922B-94E5542137BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "92F05A1F-2227-4166-807B-1BDE2EA8F245",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF73E23-7CD0-429C-986B-5F721F1696BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EECE66B3-3696-4E98-AF63-DF2FB256A6FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E75BB382-6B47-4C6A-BF94-80443BEB1A23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA75368-506F-4772-B0F2-8AAECDF288F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDD9E5C-766F-4945-B87D-781E780AB03E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A48C0BB5-2D87-49ED-A8EB-843E5F0EAE8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6AAA17D-FBB8-4F54-82E2-870D6FA5C299",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A0CAEE-5C14-44C6-85FB-6AFDAAA1C3F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "77D85664-E355-4A68-89EB-D5C9D0E6B916",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.10_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "91243043-F4A6-40EF-97FC-989ED366394C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BE667A-A937-4C38-B4D5-29B33F23F7B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A3624D4-E666-4A1B-B465-714ACBA0034C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1:alpha_3:*:*:*:*:*:*",
              "matchCriteriaId": "46B86AD1-967D-4C8E-BD31-C2A2197B1E84",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A7CBC45-320E-48CF-9A63-07DDE2FB61BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "266E32CD-66FB-4E19-8091-EC748B177D8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DD9120-2224-4612-A6EE-539F47BD50E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "14B0A9E4-9D09-4127-AF8B-4DA6D488E67C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.1.3_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8C667FD-BA00-43B3-8313-5A24A2DFF55A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A9FBA02-8A6A-471F-92CD-D8E77B5061C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1D97C81-A053-4D73-BEA7-CBCB5FC0CC83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B5BC7E8-4C8A-4183-AB8C-1DAE12935387",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0F9137B-D13F-488B-8196-85E06FAB682E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "82F257F4-CB62-4C6F-8866-AA253EC8C0C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2_revision5002:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC4F089-A606-4880-8C5D-24520B55CD14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.2_revision5003:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4F6724F-AC94-4D6B-BEB7-EF4683FD1A07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "79AB6F6F-2FE3-4FC3-9009-D40EA852711F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "94ADC624-E43E-4F1D-8525-F6903943C932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "06A25444-2680-4379-B2CA-9858B6AF71CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82F4D88-779D-4D5D-96CD-2B31B61BA29E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4801D56C-5ED6-4648-A0C9-EB4D06786A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA0DABD9-DE15-4619-8668-0277A67F5205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A80D1CBE-DA6D-4939-A4A4-8F237C97F76C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "40BEC573-A346-4F07-8053-A5F6E92A343C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A777651-D2B2-47E0-A13C-BD667635F3E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B017F95A-90F8-4DE4-B74F-ABB712F32987",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1503C4CB-5D58-4523-860C-4B637AD91CB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1253161D-F1C8-46D6-B970-20335071500E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE401B3-6291-4EA8-8800-0350BAC0B22E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F41AFB-596E-4FFA-AC46-E563122A9D2F",
              "versionEndIncluding": "2.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2912D04D-A004-4842-8EF0-B51DAAA5FD46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77286DE-D583-4359-8962-439583BE9BA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5ED66D3-5D12-42CE-8B98-6A2984DAC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB3E9E3-1341-4F34-B6D1-5DF9F3B1D1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EA81B6-0254-404D-8A2B-80C027383FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "738C3727-FCA0-4C7B-B6D6-2FC14987706A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8149192C-167C-4459-8C20-355DE0FF2921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EBC1B2B1-C8EE-47A4-BE44-CAC1A6CD432E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E6D03D-0547-4CAB-A1CF-AEAC82634437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5136FA-5060-4448-9874-3DF375467ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB8E4A4-818E-4FDF-8C83-7C8FB5C83909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F534621-ED5F-46D0-A893-D0C6DAACB0C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1930525-806B-49B1-A18E-189D41E5885C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "330826FD-833C-4BB4-8293-2812956496B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "555E7E8A-3632-416B-889E-68E98AABE8CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "75674DE5-229D-4359-B29C-E18BBC76E188",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE70A19-919A-4478-B97B-EEF9FA29BECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70524981-C0ED-4915-B0F3-A9F5D4865A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9450D1-B817-4A38-A46F-05FCB6692A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA78384-3133-442A-B135-192440FB1745",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message."
    },
    {
      "lang": "es",
      "value": "WordPress y WordPress MU antes de v2.8.1 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud directa a wp-settings.php, el cual revela la ruta de instalaci\u00f3n en un mensaje de error."
    }
  ],
  "id": "CVE-2009-2432",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-10T21:00:00.297",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/55717"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/55717"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-2335

Vulnerability from fkie_nvd - Published: 2009-07-10 21:00 - Updated: 2025-04-09 00:30
Severity ?
Summary
WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
References
cve@mitre.orghttp://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_UncheckedExploit, Third Party Advisory
cve@mitre.orghttp://securitytracker.com/id?1022528Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.exploit-db.com/exploits/9110Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.osvdb.org/55713Broken Link
cve@mitre.orghttp://www.securityfocus.com/archive/1/504795/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/35581Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1833Patch, Vendor Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.htmlThird Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.htmlThird Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.htmlThird Party Advisory
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://corelabs.coresecurity.com/index.php?action=view&type=advisory&name=WordPress_Privileges_UncheckedExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1022528Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/9110Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/55713Broken Link
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/504795/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/35581Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1833Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.htmlThird Party Advisory
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress_mu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "513237CD-92E3-46CD-8221-88F36B243101",
              "versionEndExcluding": "2.8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1327C621-452A-4BA4-B2E7-28AE4533DCC1",
              "versionEndExcluding": "2.8.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
    },
    {
      "lang": "es",
      "value": "WordPress y WordPress MU anterior a v2.8.1 expone un comportamiento diferente para un intento fallido de acceso en funci\u00f3n de si existe la cuenta de usuario, lo cual permite a atacantes remotos enumerar nombres de usuario v\u00e1lidos. NOTA: el proveedor informa de que cuestiona la importancia de esta incidencia, indicando que el comportamiento existe para conveniencia del usuario."
    }
  ],
  "id": "CVE-2009-2335",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-10T21:00:00.203",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/9110"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/55713"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35581"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1022528"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/9110"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.osvdb.org/55713"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/35581"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/1833"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-1030

Vulnerability from fkie_nvd - Published: 2009-03-20 00:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "12FFA638-4919-4D9F-9F27-F421C9F25B69",
              "versionEndIncluding": "2.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D40A30E-7BA2-4121-90D0-55EB5ACDBC4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BE8F048D-8B9D-4A1A-85CF-E0240B672864",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BCC5983D-8B24-408A-A2B0-3D9E8918734E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "7343BA05-4A07-49C3-B4D8-69F1DD308B49",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "49E5C0D7-E4FE-4A7C-9A20-D085DA63D434",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2912D04D-A004-4842-8EF0-B51DAAA5FD46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77286DE-D583-4359-8962-439583BE9BA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5ED66D3-5D12-42CE-8B98-6A2984DAC7F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFB3E9E3-1341-4F34-B6D1-5DF9F3B1D1D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EA81B6-0254-404D-8A2B-80C027383FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "738C3727-FCA0-4C7B-B6D6-2FC14987706A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8149192C-167C-4459-8C20-355DE0FF2921",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EBC1B2B1-C8EE-47A4-BE44-CAC1A6CD432E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.5a:*:*:*:*:*:*:*",
              "matchCriteriaId": "82E6D03D-0547-4CAB-A1CF-AEAC82634437",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5136FA-5060-4448-9874-3DF375467ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB8E4A4-818E-4FDF-8C83-7C8FB5C83909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F534621-ED5F-46D0-A893-D0C6DAACB0C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1930525-806B-49B1-A18E-189D41E5885C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "330826FD-833C-4BB4-8293-2812956496B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "555E7E8A-3632-416B-889E-68E98AABE8CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE70A19-919A-4478-B97B-EEF9FA29BECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70524981-C0ED-4915-B0F3-A9F5D4865A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E9450D1-B817-4A38-A46F-05FCB6692A8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA78384-3133-442A-B135-192440FB1745",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBFF1FD7-49D4-4EF3-9A2F-49058AB00AE1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n choose_primary_blog en wp-includes/wpmu-functions.php en WordPress MU (WPMU) anterior a v2.7 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de la cabecera HTTP Host."
    }
  ],
  "id": "CVE-2009-1030",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-03-20T00:30:00.703",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/34075"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1021838"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/34075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1021838"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8196"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5695

Vulnerability from fkie_nvd - Published: 2008-12-19 18:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
References
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress_mu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "149525FA-612C-4719-80F1-1CC5DB5E5E4F",
              "versionEndIncluding": "2.3.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6221BD74-B6BA-48C0-ABDC-3742656F26C9",
              "versionEndExcluding": "1.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script\u0027s pathname to active_plugins."
    },
    {
      "lang": "es",
      "value": "wp-admin/options.php en versiones de WordPress MU anteriores a la 1.3.2, y WordPress 2.3.2 y anteriores, no valida las solicitudes de actualizaci\u00f3n de una opci\u00f3n, lo que permite a usuarios remotos que tengan las capacidades manage_options y upload_files y esten autenticados, ejecutar c\u00f3digo arbitrario subiendo un Script PHP y a\u00f1adiendo la ruta de este script a los plugins activos."
    }
  ],
  "id": "CVE-2008-5695",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 8.5,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-12-19T18:30:00.467",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/28789"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/4798"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/27633"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/5066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/28789"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://securityreason.com/securityalert/4798"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/27633"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/5066"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-4671

Vulnerability from fkie_nvd - Published: 2008-10-22 10:30 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A51E6184-EC9F-46C8-879A-E086D6401278",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D40A30E-7BA2-4121-90D0-55EB5ACDBC4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0EA81B6-0254-404D-8A2B-80C027383FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "738C3727-FCA0-4C7B-B6D6-2FC14987706A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5136FA-5060-4448-9874-3DF375467ECD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FB8E4A4-818E-4FDF-8C83-7C8FB5C83909",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en el archivo wp-admin/wp-blogs.php en Wordpress MU (WPMU), en versiones anteriores a 2.6, que permite a los atacantes remotos inyectar arbitrariamente una secuencia de comandos web o HTML a trav\u00e9s de los par\u00e1metros (1) s y (2) ip_address"
    }
  ],
  "id": "CVE-2008-4671",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-10-22T10:30:01.537",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32060"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31482"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31482"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-4544

Vulnerability from fkie_nvd - Published: 2007-08-27 23:17 - Updated: 2025-04-09 00:30

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "208CBA6B-EC8C-4FA4-9B29-D45EBEC738E1",
              "versionEndIncluding": "1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field)."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en wp-newblog.php en WordPress multi-user (MU) 1.0 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro weblog_id (campo Username)."
    }
  ],
  "id": "CVE-2007-4544",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-08-27T23:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/38442"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityvulns.ru/Rdocument875.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://websecurity.com.ua/1269/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/38442"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityvulns.ru/Rdocument875.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://websecurity.com.ua/1269/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-3544

Vulnerability from fkie_nvd - Published: 2007-07-03 20:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543.
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress_mu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C80C0E7-DDB3-4BA4-866C-1C2ED8F4B012",
              "versionEndIncluding": "2.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1117E2-98ED-4215-BEAD-643BC6370C8F",
              "versionEndIncluding": "1.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad e env\u00edo de archivo no restringido en (1) wp-app.php y (2) app.php de WordPresss 2.2.1 y WordPresss MU 1.2.3 permite a usuarios autenticados remotamente enviar y ejecutar c\u00f3digo PHP de su elecci\u00f3n a trav\u00e9s de vectores no especificados, posiblemente relacionados con la tabla wp_postmeta y el uso de campos personalizados en anotaciones (posts) normales (sin adjuntos)."
    }
  ],
  "id": "CVE-2007-3544",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-03T20:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37294"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37294"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-3543

Vulnerability from fkie_nvd - Published: 2007-07-03 20:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
Impacted products
Vendor Product Version
wordpress wordpress *
wordpress wordpress_mu *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C80C0E7-DDB3-4BA4-866C-1C2ED8F4B012",
              "versionEndIncluding": "2.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F1117E2-98ED-4215-BEAD-643BC6370C8F",
              "versionEndIncluding": "1.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file\u0027s content, along with its post_ID value, to (1) wp-app.php or (2) app.php."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de fichero de archivo no restringido en WordPress anterior a 2.2.1 y WordPress MU anterior a 1.2.3 permite a usuarios autenticados remotos subir y ejecutar c\u00f3digo PHP de su elecci\u00f3n mediante un post en el que se especifica un nombre de fichero .php en el campo de meta datos _wp_attached_file; entonces se env\u00eda el contenido del fichero, junto con su valor post_ID, a (1) wp-app.php o (2) app.php."
    }
  ],
  "evaluatorImpact": "Successful exploitation requires valid Editor credentials and that the system is configured to allow uploads.",
  "id": "CVE-2007-3543",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-07-03T20:30:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/37295"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25794"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://trac.mu.wordpress.org/changeset/1005"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/24642"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/37295"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/25794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://trac.mu.wordpress.org/changeset/1005"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/24642"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-2334 (GCVE-0-2009-2334)

Vulnerability from cvelistv5 – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:44
VLAI?
Summary
wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://corelabs.coresecurity.com/index.php?action… x_refsource_MISC
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://wordpress.org/development/2009/07/wordpres… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/504795/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1022528 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1833 vdb-entryx_refsource_VUPEN
http://www.debian.org/security/2009/dsa-1871 vendor-advisoryx_refsource_DEBIAN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.osvdb.org/55712 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/35584 vdb-entryx_refsource_BID
http://www.osvdb.org/55715 vdb-entryx_refsource_OSVDB
http://www.exploit-db.com/exploits/9110 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.933Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2009-8538",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "FEDORA-2009-7729",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "FEDORA-2009-7701",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "DSA-1871",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1871"
          },
          {
            "name": "FEDORA-2009-8529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
          },
          {
            "name": "55712",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55712"
          },
          {
            "name": "35584",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35584"
          },
          {
            "name": "55715",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55715"
          },
          {
            "name": "9110",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/9110"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2009-8538",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "FEDORA-2009-7729",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "FEDORA-2009-7701",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "DSA-1871",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1871"
        },
        {
          "name": "FEDORA-2009-8529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
        },
        {
          "name": "55712",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55712"
        },
        {
          "name": "35584",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35584"
        },
        {
          "name": "55715",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55715"
        },
        {
          "name": "9110",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/9110"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2334",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2009-8538",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
            },
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "FEDORA-2009-7729",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
            },
            {
              "name": "http://wordpress.org/development/2009/07/wordpress-2-8-1/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "FEDORA-2009-7701",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "DSA-1871",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1871"
            },
            {
              "name": "FEDORA-2009-8529",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
            },
            {
              "name": "55712",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55712"
            },
            {
              "name": "35584",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35584"
            },
            {
              "name": "55715",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55715"
            },
            {
              "name": "9110",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/9110"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2334",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-05T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2335 (GCVE-0-2009-2335)

Vulnerability from cvelistv5 – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:44
VLAI?
Summary
WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://corelabs.coresecurity.com/index.php?action… x_refsource_MISC
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/archive/1/504795/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1022528 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1833 vdb-entryx_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.osvdb.org/55713 vdb-entryx_refsource_OSVDB
http://www.exploit-db.com/exploits/9110 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/35581 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2009-8538",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "FEDORA-2009-7729",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "FEDORA-2009-7701",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "FEDORA-2009-8529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
          },
          {
            "name": "55713",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55713"
          },
          {
            "name": "9110",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/9110"
          },
          {
            "name": "35581",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35581"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2009-8538",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "FEDORA-2009-7729",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "FEDORA-2009-7701",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "FEDORA-2009-8529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
        },
        {
          "name": "55713",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55713"
        },
        {
          "name": "9110",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/9110"
        },
        {
          "name": "35581",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35581"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2335",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2009-8538",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
            },
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "FEDORA-2009-7729",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "FEDORA-2009-7701",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "FEDORA-2009-8529",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
            },
            {
              "name": "55713",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55713"
            },
            {
              "name": "9110",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/9110"
            },
            {
              "name": "35581",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35581"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2335",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-05T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2432 (GCVE-0-2009-2432)

Vulnerability from cvelistv5 – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:52
VLAI?
Summary
WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.765Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "wordpress-wpsettings-path-disclosure(51734)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
          },
          {
            "name": "55717",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55717"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "wordpress-wpsettings-path-disclosure(51734)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
        },
        {
          "name": "55717",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55717"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2432",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "wordpress-wpsettings-path-disclosure(51734)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
            },
            {
              "name": "55717",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55717"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2432",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-10T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.765Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2336 (GCVE-0-2009-2336)

Vulnerability from cvelistv5 – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:44
VLAI?
Summary
The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://corelabs.coresecurity.com/index.php?action… x_refsource_MISC
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/archive/1/504795/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1022528 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1833 vdb-entryx_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.exploit-db.com/exploits/9110 exploitx_refsource_EXPLOIT-DB
http://www.osvdb.org/55714 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/35581 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:56.088Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2009-8538",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "FEDORA-2009-7729",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "FEDORA-2009-7701",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "FEDORA-2009-8529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
          },
          {
            "name": "9110",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/9110"
          },
          {
            "name": "55714",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55714"
          },
          {
            "name": "35581",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35581"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2009-8538",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "FEDORA-2009-7729",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "FEDORA-2009-7701",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "FEDORA-2009-8529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
        },
        {
          "name": "9110",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/9110"
        },
        {
          "name": "55714",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55714"
        },
        {
          "name": "35581",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35581"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2009-8538",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
            },
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "FEDORA-2009-7729",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "FEDORA-2009-7701",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "FEDORA-2009-8529",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
            },
            {
              "name": "9110",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/9110"
            },
            {
              "name": "55714",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55714"
            },
            {
              "name": "35581",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35581"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2336",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-05T00:00:00",
    "dateUpdated": "2024-08-07T05:44:56.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1030 (GCVE-0-2009-1030)

Vulnerability from cvelistv5 – Published: 2009-03-20 00:00 – Updated: 2024-08-07 04:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:57:17.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34075"
          },
          {
            "name": "1021838",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021838"
          },
          {
            "name": "wordpressmu-wpmufunctions-xss(49184)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
          },
          {
            "name": "20090310 [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
          },
          {
            "name": "HPSBUX02514",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
          },
          {
            "name": "8196",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8196"
          },
          {
            "name": "SSRT100010",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34075"
        },
        {
          "name": "1021838",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021838"
        },
        {
          "name": "wordpressmu-wpmufunctions-xss(49184)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
        },
        {
          "name": "20090310 [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
        },
        {
          "name": "HPSBUX02514",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
        },
        {
          "name": "8196",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8196"
        },
        {
          "name": "SSRT100010",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1030",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34075"
            },
            {
              "name": "1021838",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021838"
            },
            {
              "name": "wordpressmu-wpmufunctions-xss(49184)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
            },
            {
              "name": "20090310 [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
            },
            {
              "name": "HPSBUX02514",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
            },
            {
              "name": "8196",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8196"
            },
            {
              "name": "SSRT100010",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1030",
    "datePublished": "2009-03-20T00:00:00",
    "dateReserved": "2009-03-19T00:00:00",
    "dateUpdated": "2024-08-07T04:57:17.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5695 (GCVE-0-2008-5695)

Vulnerability from cvelistv5 – Published: 2008-12-19 18:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "4798",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4798"
          },
          {
            "name": "27633",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27633"
          },
          {
            "name": "5066",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5066"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
          },
          {
            "name": "28789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28789"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script\u0027s pathname to active_plugins."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "4798",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4798"
        },
        {
          "name": "27633",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27633"
        },
        {
          "name": "5066",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5066"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
        },
        {
          "name": "28789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28789"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5695",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script\u0027s pathname to active_plugins."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "4798",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4798"
            },
            {
              "name": "27633",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27633"
            },
            {
              "name": "5066",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5066"
            },
            {
              "name": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
            },
            {
              "name": "28789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28789"
            },
            {
              "name": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
            },
            {
              "name": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1",
              "refsource": "CONFIRM",
              "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5695",
    "datePublished": "2008-12-19T18:00:00",
    "dateReserved": "2008-12-19T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4671 (GCVE-0-2008-4671)

Vulnerability from cvelistv5 – Published: 2008-10-22 10:00 – Updated: 2024-08-07 10:24
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/32060 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/31482 vdb-entryx_refsource_BID
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:24:20.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wordpressmu-wpblogs-xss(45512)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
          },
          {
            "name": "32060",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32060"
          },
          {
            "name": "31482",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31482"
          },
          {
            "name": "20080929 WordPress MU \u003c 2.6 wpmu-blogs.php Crose Site Scrpting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wordpressmu-wpblogs-xss(45512)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
        },
        {
          "name": "32060",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32060"
        },
        {
          "name": "31482",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31482"
        },
        {
          "name": "20080929 WordPress MU \u003c 2.6 wpmu-blogs.php Crose Site Scrpting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4671",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wordpressmu-wpblogs-xss(45512)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
            },
            {
              "name": "32060",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32060"
            },
            {
              "name": "31482",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31482"
            },
            {
              "name": "20080929 WordPress MU \u003c 2.6 wpmu-blogs.php Crose Site Scrpting vulnerability",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4671",
    "datePublished": "2008-10-22T10:00:00",
    "dateReserved": "2008-10-21T00:00:00",
    "dateUpdated": "2024-08-07T10:24:20.682Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4544 (GCVE-0-2007-4544)

Vulnerability from cvelistv5 – Published: 2007-08-27 23:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/482006/100… mailing-listx_refsource_BUGTRAQ
http://securityvulns.ru/Rdocument875.html x_refsource_MISC
http://websecurity.com.ua/1269/ x_refsource_MISC
http://osvdb.org/38442 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20071010 Vulnerabilities digest",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://securityvulns.ru/Rdocument875.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://websecurity.com.ua/1269/"
          },
          {
            "name": "38442",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/38442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20071010 Vulnerabilities digest",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://securityvulns.ru/Rdocument875.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://websecurity.com.ua/1269/"
        },
        {
          "name": "38442",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/38442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4544",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20071010 Vulnerabilities digest",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
            },
            {
              "name": "http://securityvulns.ru/Rdocument875.html",
              "refsource": "MISC",
              "url": "http://securityvulns.ru/Rdocument875.html"
            },
            {
              "name": "http://websecurity.com.ua/1269/",
              "refsource": "MISC",
              "url": "http://websecurity.com.ua/1269/"
            },
            {
              "name": "38442",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/38442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4544",
    "datePublished": "2007-08-27T23:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.697Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3544 (GCVE-0-2007-3544)

Vulnerability from cvelistv5 – Published: 2007-07-03 20:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.159Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
          },
          {
            "name": "37294",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37294"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-31T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
        },
        {
          "name": "37294",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37294"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3544",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
            },
            {
              "name": "37294",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37294"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3544",
    "datePublished": "2007-07-03T20:00:00",
    "dateReserved": "2007-07-03T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.159Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3543 (GCVE-0-2007-3543)

Vulnerability from cvelistv5 – Published: 2007-07-03 20:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/25794 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/24642 vdb-entryx_refsource_BID
http://osvdb.org/37295 vdb-entryx_refsource_OSVDB
http://www.buayacorp.com/files/wordpress/wordpres… x_refsource_MISC
http://trac.mu.wordpress.org/changeset/1005 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25794",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25794"
          },
          {
            "name": "24642",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24642"
          },
          {
            "name": "37295",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37295"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.mu.wordpress.org/changeset/1005"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file\u0027s content, along with its post_ID value, to (1) wp-app.php or (2) app.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25794",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25794"
        },
        {
          "name": "24642",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24642"
        },
        {
          "name": "37295",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37295"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.mu.wordpress.org/changeset/1005"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3543",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file\u0027s content, along with its post_ID value, to (1) wp-app.php or (2) app.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25794",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25794"
            },
            {
              "name": "24642",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24642"
            },
            {
              "name": "37295",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37295"
            },
            {
              "name": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
            },
            {
              "name": "http://trac.mu.wordpress.org/changeset/1005",
              "refsource": "CONFIRM",
              "url": "http://trac.mu.wordpress.org/changeset/1005"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3543",
    "datePublished": "2007-07-03T20:00:00",
    "dateReserved": "2007-07-03T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.337Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2334 (GCVE-0-2009-2334)

Vulnerability from nvd – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:44
VLAI?
Summary
wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://corelabs.coresecurity.com/index.php?action… x_refsource_MISC
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://wordpress.org/development/2009/07/wordpres… x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/504795/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1022528 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1833 vdb-entryx_refsource_VUPEN
http://www.debian.org/security/2009/dsa-1871 vendor-advisoryx_refsource_DEBIAN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.osvdb.org/55712 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/35584 vdb-entryx_refsource_BID
http://www.osvdb.org/55715 vdb-entryx_refsource_OSVDB
http://www.exploit-db.com/exploits/9110 exploitx_refsource_EXPLOIT-DB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.933Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2009-8538",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "FEDORA-2009-7729",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "FEDORA-2009-7701",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "DSA-1871",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1871"
          },
          {
            "name": "FEDORA-2009-8529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
          },
          {
            "name": "55712",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55712"
          },
          {
            "name": "35584",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35584"
          },
          {
            "name": "55715",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55715"
          },
          {
            "name": "9110",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/9110"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2009-8538",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "FEDORA-2009-7729",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "FEDORA-2009-7701",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "DSA-1871",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1871"
        },
        {
          "name": "FEDORA-2009-8529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
        },
        {
          "name": "55712",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55712"
        },
        {
          "name": "35584",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35584"
        },
        {
          "name": "55715",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55715"
        },
        {
          "name": "9110",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/9110"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2334",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2009-8538",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
            },
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "FEDORA-2009-7729",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
            },
            {
              "name": "http://wordpress.org/development/2009/07/wordpress-2-8-1/",
              "refsource": "CONFIRM",
              "url": "http://wordpress.org/development/2009/07/wordpress-2-8-1/"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "FEDORA-2009-7701",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "DSA-1871",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1871"
            },
            {
              "name": "FEDORA-2009-8529",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
            },
            {
              "name": "55712",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55712"
            },
            {
              "name": "35584",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35584"
            },
            {
              "name": "55715",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55715"
            },
            {
              "name": "9110",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/9110"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2334",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-05T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2335 (GCVE-0-2009-2335)

Vulnerability from nvd – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:44
VLAI?
Summary
WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://corelabs.coresecurity.com/index.php?action… x_refsource_MISC
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/archive/1/504795/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1022528 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1833 vdb-entryx_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.osvdb.org/55713 vdb-entryx_refsource_OSVDB
http://www.exploit-db.com/exploits/9110 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/35581 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.930Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2009-8538",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "FEDORA-2009-7729",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "FEDORA-2009-7701",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "FEDORA-2009-8529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
          },
          {
            "name": "55713",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55713"
          },
          {
            "name": "9110",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/9110"
          },
          {
            "name": "35581",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35581"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2009-8538",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "FEDORA-2009-7729",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "FEDORA-2009-7701",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "FEDORA-2009-8529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
        },
        {
          "name": "55713",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55713"
        },
        {
          "name": "9110",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/9110"
        },
        {
          "name": "35581",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35581"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2335",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2009-8538",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
            },
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "FEDORA-2009-7729",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "FEDORA-2009-7701",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "FEDORA-2009-8529",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
            },
            {
              "name": "55713",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55713"
            },
            {
              "name": "9110",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/9110"
            },
            {
              "name": "35581",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35581"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2335",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-05T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2432 (GCVE-0-2009-2432)

Vulnerability from nvd – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:52
VLAI?
Summary
WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:52:14.765Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "wordpress-wpsettings-path-disclosure(51734)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
          },
          {
            "name": "55717",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55717"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "wordpress-wpsettings-path-disclosure(51734)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
        },
        {
          "name": "55717",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55717"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2432",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "WordPress and WordPress MU before 2.8.1 allow remote attackers to obtain sensitive information via a direct request to wp-settings.php, which reveals the installation path in an error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "wordpress-wpsettings-path-disclosure(51734)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/51734"
            },
            {
              "name": "55717",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55717"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2432",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-10T00:00:00",
    "dateUpdated": "2024-08-07T05:52:14.765Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-2336 (GCVE-0-2009-2336)

Vulnerability from nvd – Published: 2009-07-10 20:25 – Updated: 2024-08-07 05:44
VLAI?
Summary
The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://corelabs.coresecurity.com/index.php?action… x_refsource_MISC
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.securityfocus.com/archive/1/504795/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1022528 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.vupen.com/english/advisories/2009/1833 vdb-entryx_refsource_VUPEN
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.exploit-db.com/exploits/9110 exploitx_refsource_EXPLOIT-DB
http://www.osvdb.org/55714 vdb-entryx_refsource_OSVDB
http://www.securityfocus.com/bid/35581 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:56.088Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2009-8538",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
          },
          {
            "name": "FEDORA-2009-7729",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
          },
          {
            "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
          },
          {
            "name": "1022528",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1022528"
          },
          {
            "name": "FEDORA-2009-7701",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
          },
          {
            "name": "ADV-2009-1833",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1833"
          },
          {
            "name": "FEDORA-2009-8529",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
          },
          {
            "name": "9110",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/9110"
          },
          {
            "name": "55714",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/55714"
          },
          {
            "name": "35581",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/35581"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2009-8538",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
        },
        {
          "name": "FEDORA-2009-7729",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
        },
        {
          "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
        },
        {
          "name": "1022528",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1022528"
        },
        {
          "name": "FEDORA-2009-7701",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
        },
        {
          "name": "ADV-2009-1833",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1833"
        },
        {
          "name": "FEDORA-2009-8529",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
        },
        {
          "name": "9110",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/9110"
        },
        {
          "name": "55714",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/55714"
        },
        {
          "name": "35581",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/35581"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames.  NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for \"user convenience.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2009-8538",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00608.html"
            },
            {
              "name": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked",
              "refsource": "MISC",
              "url": "http://corelabs.coresecurity.com/index.php?action=view\u0026type=advisory\u0026name=WordPress_Privileges_Unchecked"
            },
            {
              "name": "FEDORA-2009-7729",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00676.html"
            },
            {
              "name": "20090708 CORE-2009-01515 - WordPress Privileges Unchecked in admin.php and Multiple Information",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/504795/100/0/threaded"
            },
            {
              "name": "1022528",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1022528"
            },
            {
              "name": "FEDORA-2009-7701",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-July/msg00632.html"
            },
            {
              "name": "ADV-2009-1833",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1833"
            },
            {
              "name": "FEDORA-2009-8529",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00597.html"
            },
            {
              "name": "9110",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/9110"
            },
            {
              "name": "55714",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/55714"
            },
            {
              "name": "35581",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/35581"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2336",
    "datePublished": "2009-07-10T20:25:00",
    "dateReserved": "2009-07-05T00:00:00",
    "dateUpdated": "2024-08-07T05:44:56.088Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1030 (GCVE-0-2009-1030)

Vulnerability from nvd – Published: 2009-03-20 00:00 – Updated: 2024-08-07 04:57
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:57:17.511Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "34075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/34075"
          },
          {
            "name": "1021838",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1021838"
          },
          {
            "name": "wordpressmu-wpmufunctions-xss(49184)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
          },
          {
            "name": "20090310 [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
          },
          {
            "name": "HPSBUX02514",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
          },
          {
            "name": "8196",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8196"
          },
          {
            "name": "SSRT100010",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-03-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "34075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/34075"
        },
        {
          "name": "1021838",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1021838"
        },
        {
          "name": "wordpressmu-wpmufunctions-xss(49184)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
        },
        {
          "name": "20090310 [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
        },
        {
          "name": "HPSBUX02514",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
        },
        {
          "name": "8196",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8196"
        },
        {
          "name": "SSRT100010",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1030",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "34075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/34075"
            },
            {
              "name": "1021838",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1021838"
            },
            {
              "name": "wordpressmu-wpmufunctions-xss(49184)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49184"
            },
            {
              "name": "20090310 [ISecAuditors Security Advisories] WordPress MU HTTP Header XSS Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/501667/100/0/threaded"
            },
            {
              "name": "HPSBUX02514",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
            },
            {
              "name": "8196",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8196"
            },
            {
              "name": "SSRT100010",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126996727024732\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1030",
    "datePublished": "2009-03-20T00:00:00",
    "dateReserved": "2009-03-19T00:00:00",
    "dateUpdated": "2024-08-07T04:57:17.511Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5695 (GCVE-0-2008-5695)

Vulnerability from nvd – Published: 2008-12-19 18:00 – Updated: 2024-08-07 11:04
VLAI?
Summary
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:04:44.132Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "4798",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4798"
          },
          {
            "name": "27633",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/27633"
          },
          {
            "name": "5066",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/5066"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
          },
          {
            "name": "28789",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/28789"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-02-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script\u0027s pathname to active_plugins."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "4798",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4798"
        },
        {
          "name": "27633",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/27633"
        },
        {
          "name": "5066",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/5066"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
        },
        {
          "name": "28789",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/28789"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5695",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script\u0027s pathname to active_plugins."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "4798",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4798"
            },
            {
              "name": "27633",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/27633"
            },
            {
              "name": "5066",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/5066"
            },
            {
              "name": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt"
            },
            {
              "name": "28789",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/28789"
            },
            {
              "name": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html"
            },
            {
              "name": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1",
              "refsource": "CONFIRM",
              "url": "http://mu.wordpress.org/forums/topic.php?id=7534\u0026page\u0026replies=1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5695",
    "datePublished": "2008-12-19T18:00:00",
    "dateReserved": "2008-12-19T00:00:00",
    "dateUpdated": "2024-08-07T11:04:44.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4671 (GCVE-0-2008-4671)

Vulnerability from nvd – Published: 2008-10-22 10:00 – Updated: 2024-08-07 10:24
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/32060 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/31482 vdb-entryx_refsource_BID
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:24:20.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "wordpressmu-wpblogs-xss(45512)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
          },
          {
            "name": "32060",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32060"
          },
          {
            "name": "31482",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31482"
          },
          {
            "name": "20080929 WordPress MU \u003c 2.6 wpmu-blogs.php Crose Site Scrpting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "wordpressmu-wpblogs-xss(45512)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
        },
        {
          "name": "32060",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32060"
        },
        {
          "name": "31482",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31482"
        },
        {
          "name": "20080929 WordPress MU \u003c 2.6 wpmu-blogs.php Crose Site Scrpting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4671",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "wordpressmu-wpblogs-xss(45512)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45512"
            },
            {
              "name": "32060",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32060"
            },
            {
              "name": "31482",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31482"
            },
            {
              "name": "20080929 WordPress MU \u003c 2.6 wpmu-blogs.php Crose Site Scrpting vulnerability",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2008-September/064748.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4671",
    "datePublished": "2008-10-22T10:00:00",
    "dateReserved": "2008-10-21T00:00:00",
    "dateUpdated": "2024-08-07T10:24:20.682Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-4544 (GCVE-0-2007-4544)

Vulnerability from nvd – Published: 2007-08-27 23:00 – Updated: 2024-08-07 15:01
VLAI?
Summary
Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/482006/100… mailing-listx_refsource_BUGTRAQ
http://securityvulns.ru/Rdocument875.html x_refsource_MISC
http://websecurity.com.ua/1269/ x_refsource_MISC
http://osvdb.org/38442 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.697Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20071010 Vulnerabilities digest",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://securityvulns.ru/Rdocument875.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://websecurity.com.ua/1269/"
          },
          {
            "name": "38442",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/38442"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-15T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20071010 Vulnerabilities digest",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://securityvulns.ru/Rdocument875.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://websecurity.com.ua/1269/"
        },
        {
          "name": "38442",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/38442"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4544",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20071010 Vulnerabilities digest",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/482006/100/0/threaded"
            },
            {
              "name": "http://securityvulns.ru/Rdocument875.html",
              "refsource": "MISC",
              "url": "http://securityvulns.ru/Rdocument875.html"
            },
            {
              "name": "http://websecurity.com.ua/1269/",
              "refsource": "MISC",
              "url": "http://websecurity.com.ua/1269/"
            },
            {
              "name": "38442",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/38442"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4544",
    "datePublished": "2007-08-27T23:00:00",
    "dateReserved": "2007-08-27T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.697Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3544 (GCVE-0-2007-3544)

Vulnerability from nvd – Published: 2007-07-03 20:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.159Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
          },
          {
            "name": "37294",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37294"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-10-31T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
        },
        {
          "name": "37294",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37294"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3544",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts.  NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
            },
            {
              "name": "37294",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37294"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3544",
    "datePublished": "2007-07-03T20:00:00",
    "dateReserved": "2007-07-03T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.159Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-3543 (GCVE-0-2007-3543)

Vulnerability from nvd – Published: 2007-07-03 20:00 – Updated: 2024-08-07 14:21
VLAI?
Summary
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/25794 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/24642 vdb-entryx_refsource_BID
http://osvdb.org/37295 vdb-entryx_refsource_OSVDB
http://www.buayacorp.com/files/wordpress/wordpres… x_refsource_MISC
http://trac.mu.wordpress.org/changeset/1005 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T14:21:36.337Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25794",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25794"
          },
          {
            "name": "24642",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/24642"
          },
          {
            "name": "37295",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/37295"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://trac.mu.wordpress.org/changeset/1005"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-06-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file\u0027s content, along with its post_ID value, to (1) wp-app.php or (2) app.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2008-11-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25794",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25794"
        },
        {
          "name": "24642",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/24642"
        },
        {
          "name": "37295",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/37295"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://trac.mu.wordpress.org/changeset/1005"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-3543",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file\u0027s content, along with its post_ID value, to (1) wp-app.php or (2) app.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25794",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25794"
            },
            {
              "name": "24642",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/24642"
            },
            {
              "name": "37295",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/37295"
            },
            {
              "name": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html",
              "refsource": "MISC",
              "url": "http://www.buayacorp.com/files/wordpress/wordpress-advisory.html"
            },
            {
              "name": "http://trac.mu.wordpress.org/changeset/1005",
              "refsource": "CONFIRM",
              "url": "http://trac.mu.wordpress.org/changeset/1005"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-3543",
    "datePublished": "2007-07-03T20:00:00",
    "dateReserved": "2007-07-03T00:00:00",
    "dateUpdated": "2024-08-07T14:21:36.337Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}