Description
Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: High
Availability: High
Affected Packages3 packages
Also affects: Fedora 7, 8
🔴Vulnerability Details
4GHSAGHSA-5g78-mv2p-rh9c: Wordpress 1↗2022-05-01 ▶ GHSAGHSA-m86r-5c2c-w6rq: The cookie authentication method in WordPress 2↗2022-05-01 ▶ OSVCVE-2008-1930: The cookie authentication method in WordPress 2↗2008-04-28 ▶ OSVCVE-2007-6013: Wordpress 1↗2007-11-19 ▶ 📋Vendor Advisories
3DebianCVE-2008-1930: wordpress - The cookie authentication method in WordPress 2.5 relies on a hash of a concaten...↗2008 ▶ Red Hatwordpress cookie authentication vulnerability↗2007-11-19 ▶ DebianCVE-2007-6013: wordpress - Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a passwo...↗2007 ▶ 📐Framework References
1CWEUse of a Broken or Risky Cryptographic Algorithm↗ ▶ 💬Community
1BugzillaCVE-2007-6013 wordpress cookie authentication vulnerability↗2007-11-20 ▶