CVE-2009-2431Improper Input Validation in Wordpress

Severity
5.0MEDIUMNVD
EPSS
1.2%
top 21.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 10
Latest updateMay 2

Description

WordPress 2.7.1 places the username of a post's author in an HTML comment, which allows remote attackers to obtain sensitive information by reading the HTML source.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/wordpress< wordpress 2.8.3-1 (bookworm)
Debianwordpress/wordpress< 2.8.3-1+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-9354-f967-7fw8: WordPress 22022-05-02
OSV
CVE-2009-2431: WordPress 22009-07-10

📋Vendor Advisories

2
Red Hat
wordpress: multiple vulnerabilities2009-07-08
Debian
CVE-2009-2431: wordpress - WordPress 2.7.1 places the username of a post's author in an HTML comment, which...2009

📐Framework References

1
CWE
Inclusion of Sensitive Information in Source Code Comments

💬Community

1
Bugzilla
CORE-2009-0515, CVE-2009-2334, CVE-2009-2335, CVE-2009-2336 CVE-2009-2431, CVE-2009-2432 wordpress: multiple vulnerabilities2009-07-10
CVE-2009-2431 — Improper Input Validation in Wordpress | cvebase