First published: Fri Aug 03 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the Options Database Table in the Admin Panel, accessed through options.php; or (2) the opml_url parameter to link-import.php. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4153 is classified as a high severity vulnerability due to its potential for remote code execution through XSS attacks.
To fix CVE-2007-4153, upgrade WordPress from version 2.2.1 to a later version that has patched the identified XSS vulnerabilities.
CVE-2007-4153 affects remote authenticated administrators using WordPress version 2.2.1.
CVE-2007-4153 is associated with cross-site scripting (XSS) attacks that can lead to the injection of arbitrary web script or HTML.
There are no known workarounds for CVE-2007-4153 other than to upgrade to a secure version of WordPress.