6 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:S/C:P/I:P/A:P
0.017 Low
EPSS
Percentile
87.7%
Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | wordpress | < 2.8.6-1 | wordpress_2.8.6-1_all.deb |
Debian | 11 | all | wordpress | < 2.8.6-1 | wordpress_2.8.6-1_all.deb |
Debian | 10 | all | wordpress | < 2.8.6-1 | wordpress_2.8.6-1_all.deb |
Debian | 999 | all | wordpress | < 2.8.6-1 | wordpress_2.8.6-1_all.deb |
Debian | 13 | all | wordpress | < 2.8.6-1 | wordpress_2.8.6-1_all.deb |