First published: Fri Aug 03 2007(Updated: )
SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4154 is considered a critical vulnerability due to its potential for remote authenticated administrators to execute arbitrary SQL commands.
To fix CVE-2007-4154, you should upgrade your WordPress installation to version 2.2.2 or later which addresses this vulnerability.
CVE-2007-4154 affects WordPress version 2.2.1, specifically those installations allowing remote authenticated administrators access.
CVE-2007-4154 allows attackers to perform SQL injection attacks, potentially compromising the database and modifying data.
There are no known effective workarounds for CVE-2007-4154, so upgrading to a secure version is strongly recommended.