Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash.
https://exchange.xforce.ibmcloud.com/vulnerabilities/38578
http://www.cl.cam.ac.uk/~sjm217/advisories/wordpress-cookie-auth.txt
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00098.html
https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00079.html
Source: Mitre, NVD
Published: 2007-11-19
Updated: 2025-04-09
Base Score: 6.8
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
Severity: Medium
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.01393