First published: Fri Mar 03 2006(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the "post comment" functionality of WordPress 2.0.1 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) website, and (3) comment parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =1.0.1 | |
WordPress | =1.0.2 | |
WordPress | =1.5.1.2 | |
WordPress | =1.2 | |
WordPress | =1.0 | |
WordPress | =1.5 | |
WordPress | =1.5.1 | |
WordPress | =1.5.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-0985 is generally considered to be medium due to the potential for remote code execution via cross-site scripting.
To fix CVE-2006-0985, upgrade your WordPress installation to version 2.0.2 or later.
CVE-2006-0985 affects WordPress versions 2.0.1 and earlier, along with some earlier versions down to 1.0.
CVE-2006-0985 contains multiple cross-site scripting (XSS) vulnerabilities that allow for script injection through comment inputs.
Yes, CVE-2006-0985 can be exploited by unauthenticated remote attackers who interact with the "post comment" functionality.