Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2009-2335Wordpress vulnerability

CWE-169 documents8 sources
Severity
5.0MEDIUMNVD
EPSS
85.3%
top 0.63%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 10
Latest updateMay 2

Description

WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed login attempt depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience."

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages4 packages

debiandebian/wordpress< wordpress 2.8.3-1 (bookworm)
NVDwordpress/wordpress< 2.8.1
Debianwordpress/wordpress< 2.8.3-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-4643-w74c-m4wv: WordPress and WordPress MU before 22022-05-02
OSV
CVE-2009-2335: WordPress and WordPress MU before 22009-07-10

💥Exploits & PoCs

3
Exploit-DB
WordPress Plugin Block-Spam-By-Math-Reloaded - Bypass2011-08-20
Exploit-DB
WordPress Core / MU / Plugins - '/admin.php' Privileges Unchecked / Multiple Information Disclosures2009-07-10
Metasploit
WordPress Brute Force and User Enumeration Utility

📋Vendor Advisories

2
Red Hat
wordpress: multiple vulnerabilities2009-07-08
Debian
CVE-2009-2335: wordpress - WordPress and WordPress MU before 2.8.1 exhibit different behavior for a failed ...2009

💬Community

1
Bugzilla
CORE-2009-0515, CVE-2009-2334, CVE-2009-2335, CVE-2009-2336 CVE-2009-2431, CVE-2009-2432 wordpress: multiple vulnerabilities2009-07-10
CVE-2009-2335 — Wordpress vulnerability | cvebase