First published: Sat Sep 24 2011(Updated: )
WordPress 2.9.2 and 3.0.4 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by wp-admin/includes/user.php and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress | =3.0.4 | |
WordPress | =2.9.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3818 is classified as a moderate severity vulnerability that allows unauthorized access to sensitive information.
To fix CVE-2011-3818, upgrade your WordPress installation to a version later than 3.0.4 or 2.9.2.
CVE-2011-3818 affects WordPress versions 2.9.2 and 3.0.4.
CVE-2011-3818 can expose the installation path of the WordPress application in error messages.
Yes, CVE-2011-3818 can be exploited remotely through direct requests to certain .php files.