CVE-2007-4894

critical

Description

Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters."

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/36578

https://bugzilla.redhat.com/show_bug.cgi?id=285831

http://www.vupen.com/english/advisories/2007/3132

http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html

http://wordpress.org/development/2007/09/wordpress-223/

http://trac.wordpress.org/ticket/4770

http://secunia.com/advisories/26796

http://secunia.com/advisories/26771

http://fedoranews.org/updates/FEDORA-2007-214.shtml

Details

Source: Mitre, NVD

Published: 2007-09-14

Updated: 2024-11-21

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical