4.3
CVSSv2

CVE-2008-3233

Published: 18/07/2008 Updated: 05/09/2008
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in WordPress prior to 2.6, SVN development versions only, allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress 1.0

wordpress wordpress 1.0.1

wordpress wordpress 1.0.2

wordpress wordpress 1.2

wordpress wordpress 2.0.1

wordpress wordpress 2.0.10

wordpress wordpress 2.0.10_rc1

wordpress wordpress 2.0.10_rc2

wordpress wordpress 2.1.3_rc1

wordpress wordpress 2.1.3_rc2

wordpress wordpress 2.2

wordpress wordpress 2.2.0

wordpress wordpress 0.7

wordpress wordpress 0.711

wordpress wordpress 1.2.1

wordpress wordpress 1.3.1

wordpress wordpress 1.5

wordpress wordpress 1.5.1.3

wordpress wordpress 1.6

wordpress wordpress 2.0.2

wordpress wordpress 2.0.4

wordpress wordpress 2.0.9

wordpress wordpress 2.1.1

wordpress wordpress 2.1.3

wordpress wordpress 2.2.1

wordpress wordpress 2.2.3

wordpress wordpress 2.5

wordpress wordpress 0.6.2

wordpress wordpress 1.5-strayhorn

wordpress wordpress 1.5.1

wordpress wordpress 1.5.1.1

wordpress wordpress 1.5.1.2

wordpress wordpress 2.0.5

wordpress wordpress 2.0.6

wordpress wordpress 2.0.7

wordpress wordpress 2.0.8

wordpress wordpress 2.2_revision5003

wordpress wordpress 2.3

wordpress wordpress 2.3.1

wordpress wordpress 2.3.2

wordpress wordpress 0.6.2.1

wordpress wordpress 0.71

wordpress wordpress 1.2.2

wordpress wordpress 1.4

wordpress wordpress 1.5.2

wordpress wordpress 2.0

wordpress wordpress 2.0.11

wordpress wordpress 2.0.3

wordpress wordpress 2.1

wordpress wordpress 2.1.2

wordpress wordpress 2.2.2

wordpress wordpress 2.2_revision5002

wordpress wordpress 2.3.3

wordpress wordpress

Exploits

source: wwwsecurityfocuscom/bid/30238/info WordPress is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site This may allow the att ...