WPScan
How it worksPricing
Vulnerabilities
WordPressPluginsThemesStatsSubmit vulnerabilities
For developers
StatusAPI detailsCLI scanner
Contact
WPScan
How it worksPricing
Vulnerabilities
WordPressPluginsThemesStatsSubmit vulnerabilities
For developers
StatusAPI detailsCLI scanner
Contact

WordPress Vulnerabilities

WordPress 2.9 - Failure to Restrict URL Access

Description

When WordPress implemented the new Trash feature they failed to change the permissions granted when the post is in the trash. This means that an unauthenticated user cannot see the post, however an authenticated user can, no matter what privileges they have, even ‘subscriber’.

See ExploitDB for PoC

Affects WordPress

2.9
Fixed in version 2.9.2

References

CVE
CVE-2010-0682
URL
https://blog.dewhurstsecurity.com/2010/02/13/wordpress-2-9-failure-to-restrict-url-access.html
URL
https://wordpress.org/news/2010/02/wordpress-2-9-2/
ExploitDB
11441

Classification

Type

AUTHBYPASS

OWASP top 10
A2: Broken Authentication and Session Management
CWE
CWE-287

Miscellaneous

Original Researcher

Thomas Mackenzie

Verified

Yes

WPVDB ID
2c423dc0-4fe4-4e5a-9386-412de4fb2587

Timeline

Publicly Published

2014-08-01 (about 8 years ago)

Added

2014-08-01 (about 8 years ago)

Last Updated

2020-10-31 (about 2 years ago)

Our Other Services

WPScan WordPress Security Plugin
WPScan

Vulnerabilities

WordPressPluginsThemesOur StatsSubmit vulnerabilities

About

How it worksPricingWordPress pluginNewsContact

For Developers

StatusAPI detailsCLI scanner

Other

PrivacyTerms of serviceSubmission termsDisclosure policyPrivacy Notice for California Users
jetpackIn partnership with Jetpack
githubtwitterfacebook
Angithubendeavor
Work With Us