WordPress <= 2.0.5 wp-trackback.php tb_id Parameter SQL Injection (deprecated)

High Nessus Network Monitor Plugin ID 3881


The remote host is vulnerable to a SQL Injection attack.


The remote host is running WordPress, a web blog manager written in PHP. The remote version of this software is reported to be vulnerable to a flaw where a remote attacker can inject malicious SQL statements into the 'tb_id' parameter of the 'wp-trackback.php' script. An attacker exploiting this flaw would only need to be able to send queries to the remote web server. Successful exploitation would result in the attacker executing arbitrary SQL statements on the database server utilized by WordPress.


No solution is known at this time.

See Also


Plugin Details

Severity: High

ID: 3881

Family: CGI

Published: 2007/01/10

Modified: 2018/09/16

Dependencies: 1442

Risk Information

Risk Factor: High


Base Score: 5.8

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:wordpress:wordpress

Reference Information

CVE: CVE-2007-0233

BID: 21983