First published: Mon Mar 05 2007(Updated: )
WordPress 2.1.1, as downloaded from some official distribution sites during February and March 2007, contains an externally introduced backdoor that allows remote attackers to execute arbitrary commands via (1) an eval injection vulnerability in the ix parameter to wp-includes/feed.php, and (2) an untrusted passthru call in the iz parameter to wp-includes/theme.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1277 is considered a critical vulnerability due to the presence of a backdoor that allows remote command execution.
To mitigate CVE-2007-1277, users should upgrade to a secure version of WordPress that is not affected by this vulnerability.
CVE-2007-1277 specifically affects WordPress version 2.1.1.
Yes, CVE-2007-1277 can potentially allow attackers to access sensitive information by executing arbitrary commands on the server.
No, it is not safe to use WordPress version 2.1.1 after CVE-2007-1277 has been identified, as it contains a serious security vulnerability.