First published: Fri Jul 01 2005(Updated: )
SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =1.0 | |
WordPress | =1.0.1 | |
WordPress | =1.0.2 | |
WordPress | =1.2 | |
WordPress | =1.5 | |
WordPress | =1.5.1 | |
WordPress | =1.5.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2108 is classified as a critical vulnerability due to its potential for remote exploitation through SQL injection.
To fix CVE-2005-2108, update your WordPress installation to version 1.5.1.3 or later, which has mitigated this vulnerability.
WordPress versions 1.0 through 1.5.1.2 are affected by CVE-2005-2108 and are vulnerable to SQL injection.
CVE-2005-2108 allows attackers to execute arbitrary SQL commands, potentially leading to data manipulation or unauthorized access.
Yes, the vulnerability arises from a lack of input filtering in the HTTP_RAW_POST_DATA variable, highlighting the need for proper input validation.