First published: Mon Jan 29 2007(Updated: )
WordPress allows remote attackers to determine the existence of arbitrary files, and possibly read portions of certain files, via pingback service calls with a source URI that corresponds to a local pathname, which triggers different fault codes for existing and non-existing files, and in certain configurations causes a brief file excerpt to be published as a blog comment.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-0541 is considered a medium severity vulnerability affecting WordPress.
CVE-2007-0541 allows remote attackers to confirm the existence of files through the pingback service, potentially leading to sensitive data exposure.
CVE-2007-0541 affects all versions of WordPress up to and including 2.0.
To mitigate CVE-2007-0541, it is essential to upgrade WordPress to a version that is not affected by this vulnerability.
Yes, CVE-2007-0541 can be exploited without authentication, making it particularly concerning for WordPress installations.