Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fxw5-28xr-82fm

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

EPSS

Процентиль: 99%
0.68714
Средний

Связанные уязвимости

ubuntu
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

nvd
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.

debian
почти 16 лет назад

wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to ...

EPSS

Процентиль: 99%
0.68714
Средний