Vulnerability Description
Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php. NOTE: some of these details are obtained from third party information.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | <= 2.3.3 |
Related Weaknesses (CWE)
References
- http://secunia.com/advisories/29949Vendor Advisory
- http://trac.wordpress.org/changeset/7586
- http://www.debian.org/security/2009/dsa-1871
- http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html
- http://www.securityfocus.com/bid/28845Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41920
- http://secunia.com/advisories/29949Vendor Advisory
- http://trac.wordpress.org/changeset/7586
- http://www.debian.org/security/2009/dsa-1871
- http://www.juniper.fi/security/auto/vulnerabilities/vuln28845.html
- http://www.securityfocus.com/bid/28845Exploit
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41920
FAQ
What is CVE-2008-4769?
CVE-2008-4769 is a vulnerability with a CVSS score of 9.3 (HIGH). Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitr...
How severe is CVE-2008-4769?
CVE-2008-4769 has been rated HIGH with a CVSS base score of 9.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-4769?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.