Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-4769Path Traversal in Wordpress

CWE-22Path Traversal5 documents5 sources
Severity
9.3CRITICALNVD
EPSS
17.7%
top 4.88%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 28
Latest updateMay 17

Description

Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages3 packages

debiandebian/wordpress< wordpress 2.5.1-1 (bookworm)
Debianwordpress/wordpress< 2.5.1-1+3
NVDwordpress/wordpress2.3.3+59

🔴Vulnerability Details

2
GHSA
GHSA-phhp-w7c7-3wcv: Directory traversal vulnerability in the get_category_template function in wp-includes/theme2022-05-17
OSV
CVE-2008-4769: Directory traversal vulnerability in the get_category_template function in wp-includes/theme2008-10-28

💥Exploits & PoCs

1
Exploit-DB
WordPress Core 2.3.3 - 'cat' Directory Traversal2008-04-18

📋Vendor Advisories

1
Debian
CVE-2008-4769: wordpress - Directory traversal vulnerability in the get_category_template function in wp-in...2008
CVE-2008-4769 — Path Traversal in Debian Wordpress | cvebase