This script is Copyright (C) 2009-2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
WordPress reports :
A specially crafted URL could be requested that would allow an
attacker to bypass a security check to verify a user requested a
password reset. As a result, the first account without a key in the
database (usually the admin account) would have its password reset and
a new password would be emailed to the account owner.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5
Public Exploit Available : true