First published: Tue May 30 2006(Updated: )
Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-2667 is considered to be critical, as it allows remote attackers to execute arbitrary PHP commands.
To fix CVE-2006-2667, update your WordPress installation to version 2.0.3 or later, as these versions contain the necessary security patches.
CVE-2006-2667 affects WordPress versions 2.0.2 and earlier.
Yes, CVE-2006-2667 can potentially lead to full system compromise by allowing arbitrary command execution on the server.
Attacks through CVE-2006-2667 could involve remote code execution, allowing attackers to manipulate or control server operations.