CVE-2008-0196

Source
https://cve.org/CVERecord?id=CVE-2008-0196
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2008-0196.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2008-0196
Downstream
Published
2008-01-10T00:46:00Z
Modified
2025-08-09T19:01:29Z
Summary
[none]
Details

Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the ....\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php.

References

Affected packages