First published: Mon Nov 17 2008(Updated: )
WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.6.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5113 is considered a high severity vulnerability due to the potential for remote attackers to exploit it for persistent cross-site request forgery attacks.
To fix CVE-2008-5113, update WordPress to a version newer than 2.6.3 that addresses this vulnerability.
CVE-2008-5113 specifically affects WordPress version 2.6.3.
Yes, CVE-2008-5113 can lead to data loss, as attackers may exploit it to delete user accounts.
CVE-2008-5113 involves a delayed and persistent cross-site request forgery (CSRF) attack that manipulates the REQUEST superglobal array.