CVE-2007-6013
moderate-risk
Published 2007-11-19
Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
Do I need to act?
~
1.6% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Vendors
References (26)
Broken Link
http://osvdb.org/40801
Broken Link
http://secunia.com/advisories/27714
Broken Link
http://secunia.com/advisories/28310
Broken Link
http://securityreason.com/securityalert/3375
Third Party Advisory
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt
Broken Link
http://www.securitytracker.com/id?1018980
Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578
Broken Link
http://osvdb.org/40801
Broken Link
http://secunia.com/advisories/27714
Broken Link
http://secunia.com/advisories/28310
Broken Link
http://securityreason.com/securityalert/3375
Third Party Advisory
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt
and 6 more references
45
/ 100
moderate-risk
Severity
32/34 · Critical
Exploitability
4/34 · Minimal
Exposure
9/34 · Low