Vulnerability Details CVE-2008-0196
Multiple directory traversal vulnerabilities in WordPress 2.0.11 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in (1) the page parameter to certain PHP scripts under wp-admin/ or (2) the import parameter to wp-admin/admin.php, as demonstrated by discovering the full path via a request for the \..\..\wp-config pathname; and allow remote attackers to modify arbitrary files via a .. (dot dot) in the file parameter to wp-admin/templates.php.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 42.7%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2008-0196
-
cpe:2.3:a:wordpress:wordpress:-
-
cpe:2.3:a:wordpress:wordpress:0.71
-
cpe:2.3:a:wordpress:wordpress:0.711
-
cpe:2.3:a:wordpress:wordpress:0.72
-
cpe:2.3:a:wordpress:wordpress:1.0
-
cpe:2.3:a:wordpress:wordpress:1.0.1
-
cpe:2.3:a:wordpress:wordpress:1.0.2
-
cpe:2.3:a:wordpress:wordpress:1.1.1
-
cpe:2.3:a:wordpress:wordpress:1.2
-
cpe:2.3:a:wordpress:wordpress:1.2.1
-
cpe:2.3:a:wordpress:wordpress:1.2.2
-
cpe:2.3:a:wordpress:wordpress:1.2.3
-
cpe:2.3:a:wordpress:wordpress:1.2.4
-
cpe:2.3:a:wordpress:wordpress:1.2.5
-
cpe:2.3:a:wordpress:wordpress:1.3
-
cpe:2.3:a:wordpress:wordpress:1.3.2
-
cpe:2.3:a:wordpress:wordpress:1.3.3
-
cpe:2.3:a:wordpress:wordpress:1.5
-
cpe:2.3:a:wordpress:wordpress:1.5.1
-
cpe:2.3:a:wordpress:wordpress:1.5.1.1
-
cpe:2.3:a:wordpress:wordpress:1.5.1.2
-
cpe:2.3:a:wordpress:wordpress:1.5.1.3
-
cpe:2.3:a:wordpress:wordpress:1.5.2
-
cpe:2.3:a:wordpress:wordpress:1.6.2
-
cpe:2.3:a:wordpress:wordpress:2.0
-
cpe:2.3:a:wordpress:wordpress:2.0.1
-
cpe:2.3:a:wordpress:wordpress:2.0.10
-
cpe:2.3:a:wordpress:wordpress:2.0.11
-
cpe:2.3:a:wordpress:wordpress:2.0.2
-
cpe:2.3:a:wordpress:wordpress:2.0.3
-
cpe:2.3:a:wordpress:wordpress:2.0.4
-
cpe:2.3:a:wordpress:wordpress:2.0.5
-
cpe:2.3:a:wordpress:wordpress:2.0.6
-
cpe:2.3:a:wordpress:wordpress:2.0.7
-
cpe:2.3:a:wordpress:wordpress:2.0.8
-
cpe:2.3:a:wordpress:wordpress:2.0.9