CVE-2008-5695
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
19/12/2008
Last modified:
09/04/2025
Description
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
Impact
Base Score 2.0
8.50
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* | 2.3.2 (including) | |
| cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:* | 1.3.2 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://mu.wordpress.org/forums/topic.php?id=7534&page=&replies=1
- http://secunia.com/advisories/28789
- http://securityreason.com/securityalert/4798
- http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html
- http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt
- http://www.securityfocus.com/bid/27633
- https://www.exploit-db.com/exploits/5066
- http://mu.wordpress.org/forums/topic.php?id=7534&page=&replies=1
- http://secunia.com/advisories/28789
- http://securityreason.com/securityalert/4798
- http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html
- http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt
- http://www.securityfocus.com/bid/27633
- https://www.exploit-db.com/exploits/5066



