First published: Tue Jul 03 2007(Updated: )
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.2.0 | |
WordPress | <=1.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3543 is classified as a high severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2007-3543, upgrade WordPress to version 2.2.1 or later, or WordPress MU to version 1.2.3 or later.
CVE-2007-3543 affects users of WordPress versions prior to 2.2.1 and WordPress MU versions prior to 1.2.3 with remote authenticated access.
Attackers can exploit CVE-2007-3543 to upload and execute arbitrary PHP code on vulnerable WordPress installations.
CVE-2007-3543 is not a concern for current WordPress installations if they are updated to the latest versions as the vulnerability has been patched.