Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting, SQL injection and arbitrary file upload vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, to compromise the application, access or modify data or exploit vulnerabilities in the underlying database or to upload arbitrary PHP code and run it in the context of the Web server process, which may facilitate unauthorized access or privilege escalation. WordPress version 2.2 is vulnerable.
Remediation
Update to WordPress version 2.2.1 or latest
References
http://www.buayacorp.com/files/wordpress/wordpress-advisory.html
http://www.exploit-db.com/exploits/4039/
http://www.securityfocus.com/archive/1/470837
http://packetstormsecurity.com/files/view/57108/wordpresstheme-xss.txt
Related Vulnerabilities
MediaWiki Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-1686)
Django Improper Input Validation Vulnerability (CVE-2019-3498)
WordPress Plugin Anti-Malware Security and Brute-Force Firewall Cross-Site Scripting (4.17.29)
WordPress Plugin Relevanssi Premium-A Better Search Cross-Site Scripting (1.14.8)
Oracle Application Server Permissions, Privileges, and Access Controls Vulnerability (CVE-2001-1371)