Description
wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue; however, remote code execution makes the issue important in many realistic environments
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Trustwave's SpiderLabs · textwebappsphp
https://www.exploit-db.com/exploits/18417
References (3)
Core 3
Core References
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/18417
Exploit x_refsource_misc
https://www.trustwave.com/spiderlabs/advisories/TWSL2012-002.txt
Exploit mailing-list
x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2012-01/0150.html
Scores
EPSS
0.0573
EPSS Percentile
90.5%
Details
Status
published
Products (50)
wordpress/wordpress
0.7
wordpress/wordpress
0.71
wordpress/wordpress
0.72
wordpress/wordpress
0.711
wordpress/wordpress
1.0
wordpress/wordpress
1.0.1
wordpress/wordpress
1.0.2
wordpress/wordpress
1.2
wordpress/wordpress
1.2.1
wordpress/wordpress
1.2.2
... and 40 more
Published
Jan 30, 2012
Tracked Since
Feb 18, 2026