{ "schema_version": "1.4.0", "id": "GHSA-qjrf-4pw9-57w4", "modified": "2022-05-13T01:10:43Z", "published": "2022-05-13T01:10:43Z", "aliases": [ "CVE-2008-5695" ], "details": "wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5695" }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/5066" }, { "type": "WEB", "url": "http://mu.wordpress.org/forums/topic.php?id=7534&page&replies=1" }, { "type": "WEB", "url": "http://secunia.com/advisories/28789" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/4798" }, { "type": "WEB", "url": "http://www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.html" }, { "type": "WEB", "url": "http://www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txt" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/27633" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-12-19T18:30:00Z" } }