Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2008-5695

Опубликовано: 19 дек. 2008
Источник: nvd
CVSS2: 8.5
EPSS Средний

Описание

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
Версия до 2.3.2 (включая)
cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
Версия до 1.3.2 (исключая)

EPSS

Процентиль: 95%
0.1726
Средний

8.5 High

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

debian
больше 16 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 ...

github
около 3 лет назад

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

EPSS

Процентиль: 95%
0.1726
Средний

8.5 High

CVSS2

Дефекты

CWE-20