Vulnerability Details CVE-2006-2667
Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.322
EPSS Ranking 96.6%
CVSS Severity
CVSS v2 Score 7.5
Products affected by CVE-2006-2667
-
cpe:2.3:a:wordpress:wordpress:-
-
cpe:2.3:a:wordpress:wordpress:0.71
-
cpe:2.3:a:wordpress:wordpress:0.711
-
cpe:2.3:a:wordpress:wordpress:0.72
-
cpe:2.3:a:wordpress:wordpress:1.0
-
cpe:2.3:a:wordpress:wordpress:1.0.1
-
cpe:2.3:a:wordpress:wordpress:1.0.2
-
cpe:2.3:a:wordpress:wordpress:1.1.1
-
cpe:2.3:a:wordpress:wordpress:1.2
-
cpe:2.3:a:wordpress:wordpress:1.2.1
-
cpe:2.3:a:wordpress:wordpress:1.2.2
-
cpe:2.3:a:wordpress:wordpress:1.2.3
-
cpe:2.3:a:wordpress:wordpress:1.2.4
-
cpe:2.3:a:wordpress:wordpress:1.2.5
-
cpe:2.3:a:wordpress:wordpress:1.3
-
cpe:2.3:a:wordpress:wordpress:1.3.2
-
cpe:2.3:a:wordpress:wordpress:1.3.3
-
cpe:2.3:a:wordpress:wordpress:1.5
-
cpe:2.3:a:wordpress:wordpress:1.5.1
-
cpe:2.3:a:wordpress:wordpress:1.5.1.1
-
cpe:2.3:a:wordpress:wordpress:1.5.1.2
-
cpe:2.3:a:wordpress:wordpress:1.5.1.3
-
cpe:2.3:a:wordpress:wordpress:1.5.2
-
cpe:2.3:a:wordpress:wordpress:1.6.2
-
cpe:2.3:a:wordpress:wordpress:2.0
-
cpe:2.3:a:wordpress:wordpress:2.0.1
-
cpe:2.3:a:wordpress:wordpress:2.0.2