This script is Copyright (C) 2005-2014 Tenable Network Security, Inc.
The remote Gentoo host is missing one or more security-related
The remote host is affected by the vulnerability described in GLSA-200507-02
(WordPress: Multiple vulnerabilities)
James Bercegay of the GulfTech Security Research Team discovered
that WordPress insufficiently checks data passed to the XML-RPC server.
He also discovered that WordPress has several cross-site scripting and
full path disclosure vulnerabilities.
An attacker could use the PHP script injection vulnerabilities to
execute arbitrary PHP script commands. Furthermore the cross-site
scripting vulnerabilities could be exploited to execute arbitrary
script code in a user's browser session in context of a vulnerable
There are no known workarounds at this time.
See also :
All WordPress users should upgrade to the latest available
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/wordpress-18.104.22.168'
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true
Family: Gentoo Local Security Checks
Nessus Plugin ID: 18606 (gentoo_GLSA-200507-02.nasl)
CVE ID: CVE-2005-1921