Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-5695Improper Input Validation in Wordpress MU

Severity
8.5HIGHNVD
EPSS
16.4%
top 5.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 19
Latest updateMay 13

Description

wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 6.8 | Impact: 10.0

Affected Packages4 packages

debiandebian/wordpress< wordpress 2.3.2 (bookworm)
Debianwordpress/wordpress< 2.3.2+3

🔴Vulnerability Details

2
GHSA
GHSA-qjrf-4pw9-57w4: wp-admin/options2022-05-13
OSV
CVE-2008-5695: wp-admin/options2008-12-19

💥Exploits & PoCs

1
Exploit-DB
WordPress MU < 1.3.2 - 'active_plugins' Code Execution2008-02-05

📋Vendor Advisories

1
Debian
CVE-2008-5695: wordpress - wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earli...2008
CVE-2008-5695 — Improper Input Validation in Wordpress | cvebase