The spellchecker (spellcheck.php) in DokuWiki 2006/06/04 and earlier allows remote attackers to insert and execute arbitrary PHP code via "complex curly syntax" that is inserted into a regular expression that is processed by preg_replace with the /e (executable) modifier.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T18:06:27.163Z
Reserved: 2006-06-06T00:00:00
Link: CVE-2006-2878

No data.

Status : Deferred
Published: 2006-06-07T00:02:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-2878

No data.