Unrated severityNVD Advisory· Published Dec 19, 2008· Updated Apr 23, 2026
CVE-2008-5695
CVE-2008-5695
Description
wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins.
Affected products
2- cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*Range: <=2.3.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- www.buayacorp.com/files/wordpress/wordpress-mu-options-overwrite.htmlnvdExploitThird Party Advisory
- www.buayacorp.com/files/wordpress/wp-blog-option-overwrite.txtnvdExploitThird Party Advisory
- www.exploit-db.com/exploits/5066nvdExploitThird Party AdvisoryVDB Entry
- mu.wordpress.org/forums/topic.phpnvdRelease NotesVendor Advisory
- secunia.com/advisories/28789nvdThird Party Advisory
- securityreason.com/securityalert/4798nvdThird Party Advisory
- www.securityfocus.com/bid/27633nvdThird Party AdvisoryVDB Entry
News mentions
0No linked articles in our index yet.