CVE-2007-6318

WordPress <= 2.3.1 - SQL Injection via s Parameter

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2007-6318. PoCs published by Abel Cheung.

AI-analyzed exploit summary This is a detailed advisory describing a SQL injection vulnerability in WordPress <= 2.3.1 due to improper sanitization of input when using multibyte character sets like Big5 or GBK. The proof of concept demonstrates how an attacker can dump database contents, including user password hashes, via a crafted search query.

Description

SQL injection vulnerability in wp-includes/query.php in WordPress 2.3.1 and earlier allows remote attackers to execute arbitrary SQL commands via the s parameter, when DB_CHARSET is set to (1) Big5, (2) GBK, or possibly other character set encodings that support a "\" in a multibyte character.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Abel Cheung · textwebappsphp
https://www.exploit-db.com/exploits/4721

This is a detailed advisory describing a SQL injection vulnerability in WordPress <= 2.3.1 due to improper sanitization of input when using multibyte character sets like Big5 or GBK. The proof of concept demonstrates how an attacker can dump database contents, including user password hashes, via a crafted search query.

Classification
Writeup 100%
Attack Type
Sqli
Complexity
Moderate
Reliability
Reliable
Target: WordPress <= 2.3.1
No auth needed
Prerequisites: WordPress installation with DB_CHARSET set to a vulnerable multibyte character set (e.g., GBK or Big5)
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (12)

Core 12
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1019071
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28005
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/26795
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/484828/100/0/threaded
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2007/4172
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/28310
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/3433
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/38959

Scores

EPSS 0.0353
EPSS Percentile 87.8%

Details

CWE
CWE-89
Status published
Products (24)
wordpress/wordpress 2.0
wordpress/wordpress 2.0.1
wordpress/wordpress 2.0.2
wordpress/wordpress 2.0.3
wordpress/wordpress 2.0.4
wordpress/wordpress 2.0.5
wordpress/wordpress 2.0.6
wordpress/wordpress 2.0.7
wordpress/wordpress 2.0.10
wordpress/wordpress 2.0.10_rc1
... and 14 more
Published Dec 12, 2007
Tracked Since Feb 18, 2026