First published: Thu Feb 28 2008(Updated: )
Eval injection vulnerability in modules/execute.php in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allows remote attackers to execute arbitrary PHP code via the text parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Wordpress Sniplets Plugin | =1.2.2 | |
Wordpress Sniplets Plugin | =1.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1060 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2008-1060, upgrade the Sniplets plugin to the latest version available that does not contain this vulnerability.
CVE-2008-1060 affects users of the Sniplets plugin for WordPress versions 1.1.2 and 1.2.2.
CVE-2008-1060 is an eval injection vulnerability that allows execution of arbitrary PHP code.
Yes, CVE-2008-1060 can be exploited remotely by attackers exploiting the text parameter.