Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qjrf-4pw9-57w4

Опубликовано: 13 мая 2022
Источник: github
Github: Не прошло ревью

Описание

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

EPSS

Процентиль: 95%
0.1726
Средний

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

nvd
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

debian
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 ...

EPSS

Процентиль: 95%
0.1726
Средний

Дефекты

CWE-20