First published: Tue Feb 23 2010(Updated: )
WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =2.9 | |
WordPress | =2.9.1 | |
WordPress | =2.9.1-beta1 | |
WordPress | =2.9.1-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2010-0682 is considered moderate as it allows authenticated users to access private information.
To fix CVE-2010-0682, upgrade your WordPress installation to version 2.9.2 or later.
CVE-2010-0682 affects WordPress versions 2.9, 2.9.1, 2.9.1-beta1, and 2.9.1-rc1.
CVE-2010-0682 is a privilege escalation vulnerability that allows unauthorized access to trash posts.
Authenticated users in WordPress 2.9 and prior versions are impacted by CVE-2010-0682.