Remote Code Execution in WP-Syntax Plugin by WordPress
CVE-2009-2852
Currently unrated
Summary
The WP-Syntax plugin version 0.9.1 and earlier, when run with register_globals enabled, presents a significant risk that allows remote attackers to execute arbitrary PHP code. This is achieved through manipulation of the test_filter[wp_head] array parameter in the test/index.php file, which is utilized in a call to the call_user_func_array function. This vulnerability can lead to severe security breaches if left unaddressed, compromising the integrity and confidentiality of affected systems.
References
Timeline
Vulnerability published
Vulnerability Reserved