Description
WordPress before 2.0.6, when mbstring is enabled for PHP, decodes alternate character sets after escaping the SQL query, which allows remote attackers to bypass SQL injection protection schemes and execute arbitrary SQL commands via multibyte charsets, as demonstrated using UTF-7.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Stefan Esser · pythonwebappsphp
https://www.exploit-db.com/exploits/3095
References (12)
Core 12
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/31579
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/31297
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21907
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23741
Patch, Vendor Advisory vendor-advisory
x_refsource_openpkg
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.005.html
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200701-10.xml
Patch x_refsource_confirm
http://wordpress.org/development/2007/01/wordpress-206/
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23595
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/456049/100/0/threaded
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2007/0061
Patch, Vendor Advisory x_refsource_misc
http://www.hardened-php.net/advisory_022007.141.html
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2112
Scores
EPSS
0.0694
EPSS Percentile
91.5%
Details
Status
published
Products (1)
wordpress/wordpress
< 2.0.5
Published
Jan 09, 2007
Tracked Since
Feb 18, 2026