First published: Fri Dec 19 2008(Updated: )
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.3.2 | |
WordPress | <1.3.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5695 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2008-5695, upgrade to WordPress version 2.3.3 or later, or WordPress MU version 1.3.2 or later.
CVE-2008-5695 affects remote authenticated users with manage_options and upload_files capabilities in WordPress and WordPress MU.
An attacker can execute arbitrary code by uploading a malicious PHP script due to the inadequate validation of requests.
CVE-2008-5695 was reported in late 2008, impacting specific versions of WordPress MU and WordPress.