CVE-2007-3543

Published Jul 3, 2007

Last updated 16 years ago

Overview

Description
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
Source
cve@mitre.org
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
6
Impact score
6.4
Exploitability score
6.8
Vector string
AV:N/AC:M/Au:S/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
NVD-CWE-Other

Evaluator

Comment
-
Impact
Successful exploitation requires valid Editor credentials and that the system is configured to allow uploads.
Solution
Successful exploitation requires valid Editor credentials and that the system is configured to allow uploads.

Configurations