CVE-2011-4899

Wordpress < 3.3.1 - Remote Code Execution

Title source: rule
STIX 2.1

Description

wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue; however, remote code execution makes the issue important in many realistic environments

Exploits (1)

exploitdb WORKING POC VERIFIED
by Trustwave's SpiderLabs · textwebappsphp
https://www.exploit-db.com/exploits/18417

References (3)

Core 3
Core References
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/18417
Exploit mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-01/0150.html

Scores

EPSS 0.0573
EPSS Percentile 90.5%

Details

Status published
Products (50)
wordpress/wordpress 0.7
wordpress/wordpress 0.71
wordpress/wordpress 0.72
wordpress/wordpress 0.711
wordpress/wordpress 1.0
wordpress/wordpress 1.0.1
wordpress/wordpress 1.0.2
wordpress/wordpress 1.2
wordpress/wordpress 1.2.1
wordpress/wordpress 1.2.2
... and 40 more
Published Jan 30, 2012
Tracked Since Feb 18, 2026