Multiple SQL injection vulnerabilities in Wordpress prior to 2.2.3 and Wordpress multi-user (MU) prior to 1.2.5a allow remote malicious users to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to "early database escaping" and missing validation of "query string like parameters."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
wordpress wordpress 0.6.2 |
||
wordpress wordpress 1.5 |
||
wordpress wordpress 1.5.1 |
||
wordpress wordpress 2.0.2 |
||
wordpress wordpress 2.0.3 |
||
wordpress wordpress 2.1.3_rc1 |
||
wordpress wordpress 2.1.3_rc2 |
||
wordpress wordpress 1.2.1 |
||
wordpress wordpress 1.2.2 |
||
wordpress wordpress 2.0.10_rc1 |
||
wordpress wordpress 2.0.10_rc2 |
||
wordpress wordpress 2.1.1 |
||
wordpress wordpress 2.1.2 |
||
wordpress wordpress 2.1.3 |
||
wordpress wordpress 2.2_revision5003 |
||
wordpress wordpress 0.71 |
||
wordpress wordpress 1.2 |
||
wordpress wordpress 2.0 |
||
wordpress wordpress 2.0.1 |
||
wordpress wordpress 2.0.6 |
||
wordpress wordpress 2.0.7 |
||
wordpress wordpress 2.2.2 |
||
wordpress wordpress 2.2_revision5002 |
||
wordpress wordpress 0.6.2.1 |
||
wordpress wordpress 0.7 |
||
wordpress wordpress 1.5.1.2 |
||
wordpress wordpress 1.5.1.3 |
||
wordpress wordpress 2.0.4 |
||
wordpress wordpress 2.0.5 |
||
wordpress wordpress 2.2 |
||
wordpress wordpress 2.2.1 |