First published: Sat Mar 10 2007(Updated: )
WordPress allows remote attackers to obtain sensitive information via a direct request for wp-admin/admin-functions.php, which reveals the path in an error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.2 | |
WordPress | =2.0.3 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.1 | |
WordPress | =2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1409 has a medium severity rating due to the potential exposure of sensitive information.
CVE-2007-1409 allows remote attackers to access sensitive paths in error messages by directly requesting specific PHP files.
To address CVE-2007-1409, it is recommended to upgrade WordPress to the latest version available.
CVE-2007-1409 affects WordPress versions 2.0 through 2.1.1.
Mitigating CVE-2007-1409 without upgrading is generally not advisable as the best solution is to patch by upgrading to a newer version of WordPress.