Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T17:58:51.443Z
Reserved: 2006-05-30T00:00:00
Link: CVE-2006-2667

No data.

Status : Modified
Published: 2006-05-30T21:02:00.000
Modified: 2024-11-21T00:11:47.143
Link: CVE-2006-2667

No data.