CVE-2008-2392

Source
https://nvd.nist.gov/vuln/detail/CVE-2008-2392
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2008-2392.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2008-2392
Published
2008-05-21T13:24:00Z
Modified
2025-02-21T05:00:03Z
Summary
[none]
Details

Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier might allow remote authenticated administrators to upload and execute arbitrary PHP files via the Upload section in the Write Tabs area of the dashboard.

References

Affected packages

Debian:11 / wordpress

Package

Name
wordpress
Purl
pkg:deb/debian/wordpress?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1-4

Ecosystem specific

{
    "urgency": "low"
}

Debian:12 / wordpress

Package

Name
wordpress
Purl
pkg:deb/debian/wordpress?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1-4

Ecosystem specific

{
    "urgency": "low"
}

Debian:13 / wordpress

Package

Name
wordpress
Purl
pkg:deb/debian/wordpress?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.5.1-4

Ecosystem specific

{
    "urgency": "low"
}