First published: Thu Aug 13 2009(Updated: )
wp-login.php in WordPress 2.8.3 and earlier allows remote attackers to force a password reset for the first user in the database, possibly the administrator, via a key[] array variable in a resetpass (aka rp) action, which bypasses a check that assumes that $key is not an array.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | <=2.8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2762 has a high severity level due to its potential to allow unauthorized password resets for the first user.
To fix CVE-2009-2762, you should update to WordPress version 2.8.4 or later.
CVE-2009-2762 affects WordPress versions 2.8.3 and earlier.
CVE-2009-2762 exploits a flaw in wp-login.php that allows attackers to bypass checks and force a password reset.
Administrators and the first user in the database can be affected by the exploitation of CVE-2009-2762.