
We found results for “”
CVE-2008-5113
Good to know:

Date: November 17, 2008
WordPress 2.6.3 relies on the REQUEST superglobal array in certain dangerous situations, which makes it easier for remote attackers to conduct delayed and persistent cross-site request forgery (CSRF) attacks via crafted cookies, as demonstrated by attacks that (1) delete user accounts or (2) cause a denial of service (loss of application access). NOTE: this issue relies on the presence of an independent vulnerability that allows cookie injection.
Language: PHP
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Cross-Site Request Forgery (CSRF)
CWE-352Top Fix

Upgrade Version
Upgrade to version cyruscollier/wordpress-develop - 2.7.0;kanopi/wordpress-core - 2.7;inpsyde/wordpress-dev - 2.7.0;mindgruve/wordpress - 2.7;humanit-se/wordpress-sv - v2.7;jesseberkhof/wordpress-fork - 2.7;dotcra/wprdpress - 2.7;wplib/wordpress - 2.7;johnpbloch/wordpress-core - 2.6.1;vocativ/wordpress - 2.7;wp-extended/wordpress - 2.6.1;radialfunction/unicourt-blog - 2.7;medreleaf/wordpress - 2.7;openify/wordpress-composer - 2.7
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | LOW |
Availability (A): | LOW |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | HIGH |
Authentication (AU): | NONE |
Confidentiality (C): | NONE |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |