9.8
CVSSv3

CVE-2007-6013

Published: 19/11/2007 Updated: 09/02/2024
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Wordpress 1.5 up to and including 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows malicious users to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress

fedoraproject fedora 8

fedoraproject fedora 7

Vendor Advisories

Debian Bug report logs - #452251 CVE-2007-6013 authentication bypass for users with read permissions to the wordpress table Package: wordpress; Maintainer for wordpress is Craig Small <csmall@debianorg>; Source for wordpress is src:wordpress (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Wed, ...