Vulnerability Description
Wordpress before 2.8.3 allows remote attackers to gain privileges via a direct request to (1) admin-footer.php, (2) edit-category-form.php, (3) edit-form-advanced.php, (4) edit-form-comment.php, (5) edit-link-category-form.php, (6) edit-link-form.php, (7) edit-page-form.php, and (8) edit-tag-form.php in wp-admin/.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | 0.71 |
Related Weaknesses (CWE)
References
- http://core.trac.wordpress.org/changeset/11768ExploitVendor Advisory
- http://core.trac.wordpress.org/changeset/11769ExploitVendor Advisory
- http://wordpress.org/development/2009/08/wordpress-2-8-3-security-release/PatchVendor Advisory
- http://www.debian.org/security/2009/dsa-1871Third Party Advisory
- http://www.openwall.com/lists/oss-security/2009/08/04/5Mailing ListThird Party Advisory
- http://core.trac.wordpress.org/changeset/11768ExploitVendor Advisory
- http://core.trac.wordpress.org/changeset/11769ExploitVendor Advisory
- http://wordpress.org/development/2009/08/wordpress-2-8-3-security-release/PatchVendor Advisory
- http://www.debian.org/security/2009/dsa-1871Third Party Advisory
- http://www.openwall.com/lists/oss-security/2009/08/04/5Mailing ListThird Party Advisory
FAQ
What is CVE-2009-2853?
CVE-2009-2853 is a vulnerability with a CVSS score of 10.0 (HIGH). Wordpress before 2.8.3 allows remote attackers to gain privileges via a direct request to (1) admin-footer.php, (2) edit-category-form.php, (3) edit-form-advanced.php, (4) edit-form-comment.php, (5) e...
How severe is CVE-2009-2853?
CVE-2009-2853 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2009-2853?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.