First published: Fri Mar 26 2010(Updated: )
SQL injection vulnerability in mycategoryorder.php in the My Category Order plugin 2.8 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the parentID parameter in an act_OrderCategories action to wp-admin/post-new.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Andrew Charlton My Category Order | <=2.8 | |
Andrew Charlton My Category Order | =2.6.1 | |
Andrew Charlton My Category Order | =2.6.1a | |
Andrew Charlton My Category Order | =2.7 | |
Andrew Charlton My Category Order | =2.7.1 | |
WordPress | ||
All of | ||
Any of | ||
Andrew Charlton My Category Order | <=2.8 | |
Andrew Charlton My Category Order | =2.6.1 | |
Andrew Charlton My Category Order | =2.6.1a | |
Andrew Charlton My Category Order | =2.7 | |
Andrew Charlton My Category Order | =2.7.1 | |
WordPress |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-4748 is categorized as a high risk due to its potential for SQL injection attacks.
To fix CVE-2009-4748, update the My Category Order plugin to version 2.9 or later.
CVE-2009-4748 affects My Category Order plugin versions 2.8 and earlier for WordPress.
Yes, CVE-2009-4748 allows remote attackers to execute arbitrary SQL commands.
The exploit path for CVE-2009-4748 involves manipulating the parentID parameter in the act_OrderCategories action.