SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components.
References
Configurations
History
21 Nov 2024, 00:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/ - | |
References | () http://secunia.com/advisories/30013 - | |
References | () http://www.debian.org/security/2008/dsa-1564 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/35719 - |
Information
Published : 2007-08-03 20:17
Updated : 2024-11-21 00:34
NVD link : CVE-2007-4154
Mitre link : CVE-2007-4154
CVE.ORG link : CVE-2007-4154
JSON object : View
Products Affected
wordpress
- wordpress
CWE