First published: Fri Mar 23 2007(Updated: )
Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.0 | |
WordPress | =2.0.1 | |
WordPress | =2.0.2 | |
WordPress | =2.0.3 | |
WordPress | =2.0.4 | |
WordPress | =2.0.5 | |
WordPress | =2.0.6 | |
WordPress | =2.0.7 | |
WordPress | =2.0.10 | |
WordPress | =2.0.10_rc1 | |
WordPress | =2.1 | |
WordPress | =2.1.1 | |
WordPress | =2.1.2 | |
WordPress | =2.1.3_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1622 has a medium severity rating due to its impact on the security of WordPress admin interface.
To fix CVE-2007-1622, upgrade WordPress to version 2.0.10 or later, or 2.1.3 RC2 or later.
CVE-2007-1622 is a cross-site scripting (XSS) vulnerability affecting WordPress.
Remote authenticated users with theme privileges in WordPress prior to the patched versions are affected by CVE-2007-1622.
WordPress versions prior to 2.0.10 and 2.1.3 RC2 are affected by CVE-2007-1622.