Remote Code Execution in WP-Syntax Plugin by WordPress
CVE-2009-2852

Currently unrated

Key Information:

Vendor
Wordpress
Status
Vendor
CVE Published:
18 August 2009

Summary

The WP-Syntax plugin version 0.9.1 and earlier, when run with register_globals enabled, presents a significant risk that allows remote attackers to execute arbitrary PHP code. This is achieved through manipulation of the test_filter[wp_head] array parameter in the test/index.php file, which is utilized in a call to the call_user_func_array function. This vulnerability can lead to severe security breaches if left unaddressed, compromising the integrity and confidentiality of affected systems.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.