CVE-2007-6013Use of a Broken or Risky Cryptographic Algorithm in Wordpress

Severity
9.8CRITICALNVD
NVD7.5
EPSS
1.6%
top 18.53%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 19
Latest updateMay 1

Description

Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

debiandebian/wordpress< wordpress 2.5.1-1 (bookworm)+1
Debianwordpress/wordpress< 2.5.0-1+7
NVDwordpress/wordpress1.52.3.1+1

Also affects: Fedora 7, 8

🔴Vulnerability Details

4
GHSA
GHSA-5g78-mv2p-rh9c: Wordpress 12022-05-01
GHSA
GHSA-m86r-5c2c-w6rq: The cookie authentication method in WordPress 22022-05-01
OSV
CVE-2008-1930: The cookie authentication method in WordPress 22008-04-28
OSV
CVE-2007-6013: Wordpress 12007-11-19

📋Vendor Advisories

3
Debian
CVE-2008-1930: wordpress - The cookie authentication method in WordPress 2.5 relies on a hash of a concaten...2008
Red Hat
wordpress cookie authentication vulnerability2007-11-19
Debian
CVE-2007-6013: wordpress - Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a passwo...2007

📐Framework References

1
CWE
Use of a Broken or Risky Cryptographic Algorithm

💬Community

1
Bugzilla
CVE-2007-6013 wordpress cookie authentication vulnerability2007-11-20
CVE-2007-6013 — Debian Wordpress vulnerability | cvebase