Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-qw75-fm4f-23pq

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

WP-Syntax plugin 0.9.1 and earlier for Wordpress, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via the test_filter[wp_head] array parameter to test/index.php, which is used in a call to the call_user_func_array function.

WP-Syntax plugin 0.9.1 and earlier for Wordpress, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via the test_filter[wp_head] array parameter to test/index.php, which is used in a call to the call_user_func_array function.

EPSS

Процентиль: 84%
0.02191
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 16 лет назад

WP-Syntax plugin 0.9.1 and earlier for Wordpress, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via the test_filter[wp_head] array parameter to test/index.php, which is used in a call to the call_user_func_array function.

EPSS

Процентиль: 84%
0.02191
Низкий

Дефекты

CWE-20