CVE-2010-0682

WordPress 2.9 - Authenticated Information Disclosure via Trash Post Access

Title source: llm
STIX 2.1

Exploitation Summary

EIP tracks 1 public exploit for CVE-2010-0682. PoCs published by tmacuk.

AI-analyzed exploit summary This PoC exploits a failure to restrict URL access in WordPress >= 2.9, allowing authenticated users with minimal privileges (e.g., 'subscriber') to access trashed posts. The script iterates through post IDs, comparing responses between authenticated and unauthenticated requests to identify trashed posts.

Description

WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter.

Exploits (1)

exploitdb WORKING POC VERIFIED
by tmacuk · textwebappsphp
https://www.exploit-db.com/exploits/11441

This PoC exploits a failure to restrict URL access in WordPress >= 2.9, allowing authenticated users with minimal privileges (e.g., 'subscriber') to access trashed posts. The script iterates through post IDs, comparing responses between authenticated and unauthenticated requests to identify trashed posts.

Classification
Working Poc 95%
Attack Type
Auth Bypass
Complexity
Moderate
Reliability
Reliable
Target: WordPress >= 2.9
Auth required
Prerequisites: Authenticated user cookie (any privilege level) · WordPress installation with trashed posts
devstral-2 · analyzed Feb 16, 2026 Full analysis →

References (9)

Core 9
Core References
Various Sources x_refsource_misc
http://tmacuk.co.uk/?p=180
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052932.html
Patch, Vendor Advisory x_refsource_confirm
http://wordpress.org/development/2010/02/wordpress-2-9-2/
Third Party Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/42871
Product x_refsource_confirm
https://core.trac.wordpress.org/ticket/11236
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/38592
Mailing List, Third Party Advisory vendor-advisory x_refsource_fedora
http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052917.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/62330

Scores

EPSS 0.2499
EPSS Percentile 96.2%

Details

CWE
CWE-264
Status published
Products (2)
wordpress/wordpress 2.9
wordpress/wordpress 2.9.1 (3 CPE variants)
Published Feb 23, 2010
Tracked Since Feb 18, 2026