6.8

CVE-2009-2852

Exploit

WP Syntax < 0.9.10 - Remote Code Execution

WP-Syntax plugin 0.9.1 and earlier for Wordpress, with register_globals enabled, allows remote attackers to execute arbitrary PHP code via the test_filter[wp_head] array parameter to test/index.php, which is used in a call to the call_user_func_array function.
Mögliche Gegenmaßnahme
WP-Syntax: Update to version 0.9.10, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt WP-Syntax
Version *-0.9.9
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Ryan.McgearyWp-syntax Version <= 0.9.1
   WordpressWordpress
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 2.19% 0.838
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.