9.3

CVE-2008-4769

Exploit

Directory traversal vulnerability in the get_category_template function in wp-includes/theme.php in WordPress 2.3.3 and earlier, and 2.5, allows remote attackers to include and possibly execute arbitrary PHP files via the cat parameter in index.php.  NOTE: some of these details are obtained from third party information.

Data is provided by the National Vulnerability Database (NVD)
WordpressWordpress Version <= 2.3.3
WordpressWordpress Version0.6.2
WordpressWordpress Version0.6.2 Updatebeta_2
WordpressWordpress Version0.6.2.1
WordpressWordpress Version0.6.2.1 Updatebeta_2
WordpressWordpress Version0.7
WordpressWordpress Version0.71
WordpressWordpress Version0.71-gold
WordpressWordpress Version0.72
WordpressWordpress Version0.72 Updatebeta1
WordpressWordpress Version0.72 Updatebeta2
WordpressWordpress Version0.72 Updaterc1
WordpressWordpress Version0.711
WordpressWordpress Version1.0
WordpressWordpress Version1.0-platinum
WordpressWordpress Version1.0.1
WordpressWordpress Version1.0.1-miles
WordpressWordpress Version1.0.2
WordpressWordpress Version1.0.2-blakey
WordpressWordpress Version1.2
WordpressWordpress Version1.2 Updatebeta
WordpressWordpress Version1.2-delta
WordpressWordpress Version1.2-mingus
WordpressWordpress Version1.2.1
WordpressWordpress Version1.2.2
WordpressWordpress Version1.3.1
WordpressWordpress Version1.4
WordpressWordpress Version1.5
WordpressWordpress Version1.5-strayhorn
WordpressWordpress Version1.5.1
WordpressWordpress Version1.5.1.1
WordpressWordpress Version1.5.1.2
WordpressWordpress Version1.5.1.3
WordpressWordpress Version1.5.2
WordpressWordpress Version1.6
WordpressWordpress Version2.0
WordpressWordpress Version2.0.1
WordpressWordpress Version2.0.2
WordpressWordpress Version2.0.3
WordpressWordpress Version2.0.4
WordpressWordpress Version2.0.5
WordpressWordpress Version2.0.6
WordpressWordpress Version2.0.7
WordpressWordpress Version2.0.8
WordpressWordpress Version2.0.9
WordpressWordpress Version2.0.10
WordpressWordpress Version2.0.10_rc1
WordpressWordpress Version2.0.10_rc2
WordpressWordpress Version2.0.11
WordpressWordpress Version2.1
WordpressWordpress Version2.1 Updatealpha_3
WordpressWordpress Version2.1.1
WordpressWordpress Version2.1.2
WordpressWordpress Version2.1.3
WordpressWordpress Version2.1.3_rc1
WordpressWordpress Version2.1.3_rc2
WordpressWordpress Version2.2
WordpressWordpress Version2.2.0
WordpressWordpress Version2.2.1
WordpressWordpress Version2.2.2
WordpressWordpress Version2.2.3
WordpressWordpress Version2.2_revision5002
WordpressWordpress Version2.2_revision5003
WordpressWordpress Version2.3
WordpressWordpress Version2.3.1
WordpressWordpress Version2.3.1 Updaterc1
WordpressWordpress Version2.3.2
WordpressWordpress Version2.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 12.57% 0.937
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 9.3 8.6 10
AV:N/AC:M/Au:N/C:C/I:C/A:C
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.