4.3
CVSSv2

CVE-2008-3233

Published: 18/07/2008 Updated: 05/09/2008
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in WordPress prior to 2.6, SVN development versions only, allows remote malicious users to inject arbitrary web script or HTML via unspecified vectors.

Vulnerable Product Search on Vulmon Subscribe to Product

wordpress wordpress 2.0.11

wordpress wordpress 2.0

wordpress wordpress 2.1.1

wordpress wordpress 2.1.3 rc2

wordpress wordpress 2.2.3

wordpress wordpress 2.0.2

wordpress wordpress 2.1

wordpress wordpress 2.0.10 rc1

wordpress wordpress 1.5-strayhorn

wordpress wordpress 2.0.6

wordpress wordpress 2.0.1

wordpress wordpress 2.0.4

wordpress wordpress 1.3.1

wordpress wordpress 2.2 revision5003

wordpress wordpress 0.711

wordpress wordpress 0.6.2.1

wordpress wordpress 1.4

wordpress wordpress 2.2

wordpress wordpress 1.2.1

wordpress wordpress 0.7

wordpress wordpress 2.1.3

wordpress wordpress 2.0.7

wordpress wordpress 2.2.0

wordpress wordpress 2.1.2

wordpress wordpress 0.71

wordpress wordpress 2.0.5

wordpress wordpress 0.6.2

wordpress wordpress 2.2.2

wordpress wordpress 2.3.3

wordpress wordpress 1.5.1.1

wordpress wordpress 2.0.9

wordpress wordpress 2.2.1

wordpress wordpress 1.5.2

wordpress wordpress 1.6

wordpress wordpress 1.0.1

wordpress wordpress 2.0.10 rc2

wordpress wordpress 2.3.1

wordpress wordpress 1.0.2

wordpress wordpress 2.0.3

wordpress wordpress 1.5.1.2

wordpress wordpress 1.2

wordpress wordpress 2.5

wordpress wordpress 2.1.3 rc1

wordpress wordpress 1.2.2

wordpress wordpress 2.0.10

wordpress wordpress 1.0

wordpress wordpress 1.5

wordpress wordpress 1.5.1

wordpress wordpress 1.5.1.3

wordpress wordpress 2.3.2

wordpress wordpress

wordpress wordpress 2.2 revision5002

wordpress wordpress 2.0.8

wordpress wordpress 2.3

Exploits

source: wwwsecurityfocuscom/bid/30238/info WordPress is prone to multiple cross-site scripting vulnerabilities because it fails to properly sanitize user-supplied input An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site This may allow the att ...