CVE-2009-2334

N/A Unknown
Published: July 10, 2009 Modified: April 23, 2026
View on NVD

Description

wp-admin/admin.php in WordPress and WordPress MU before 2.8.1 does not require administrative authentication to access the configuration of a plugin, which allows remote attackers to specify a configuration file in the page parameter to obtain sensitive information or modify this file, as demonstrated by the (1) collapsing-archives/options.txt, (2) akismet/readme.txt, (3) related-ways-to-take-action/options.php, (4) wp-security-scan/securityscan.php, and (5) wp-ids/ids-admin.php files. NOTE: this can be leveraged for cross-site scripting (XSS) and denial of service.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.osvdb.org/55712
Source: cve@mitre.org
Exploit Patch
http://www.osvdb.org/55715
Source: cve@mitre.org
Patch
http://www.securityfocus.com/bid/35584
Source: cve@mitre.org
Exploit Patch
http://www.vupen.com/english/advisories/2009/1833
Source: cve@mitre.org
Patch Vendor Advisory
http://securitytracker.com/id?1022528
Source: af854a3a-2127-422b-91ae-364da2661108
http://wordpress.org/development/2009/07/wordpress-2-8-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2009/dsa-1871
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.exploit-db.com/exploits/9110
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/55712
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.osvdb.org/55715
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.securityfocus.com/archive/1/504795/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35584
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch
http://www.vupen.com/english/advisories/2009/1833
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory

28 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
12.3%
94th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

wordpress