Vulnerability Details : CVE-2007-3543
Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php.
Products affected by CVE-2007-3543
- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
- cpe:2.3:a:wordpress:wordpress_mu:*:*:*:*:*:*:*:*
Threat overview for CVE-2007-3543
Top countries where our scanners detected CVE-2007-3543
Top open port discovered on systems with this issue
80
IPs affected by CVE-2007-3543 2
Find out if you* are
affected by CVE-2007-3543!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2007-3543
0.42%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 74 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3543
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST |
References for CVE-2007-3543
-
http://trac.mu.wordpress.org/changeset/1005
-
http://www.securityfocus.com/bid/24642
-
http://www.buayacorp.com/files/wordpress/wordpress-advisory.html
Arbitrary File Upload Vulnerability in Wordpress and Wordpress MU
Jump to