WordPress contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'file' variable upon submission to the 'templates.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Upgrade to version 2.0.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.
WordPress templates.php file Variable XSS
Vendor Specific News/Changelog Entry: http://trac.wordpress.org/changeset/4665 Secunia Advisory ID:23587 Secunia Advisory ID:23741 Other Advisory URL: http://michaeldaw.org/md-hacks/wordpress-persistent-xss Other Advisory URL: http://www.gentoo.org/security/en/glsa/glsa-200701-10.xml Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0456.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0473.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2006-12/0476.html ISS X-Force ID: 31133 FrSIRT Advisory: ADV-2006-5191 CVE-2006-6808 Bugtraq ID: 21782