Description
Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument.
Remediation
References
Related Vulnerabilities
Sqlite NULL Pointer Dereference Vulnerability (CVE-2020-13435)
Liferay DXP URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2023-5190)
WordPress Plugin UpdraftPlus WordPress Backup Cross-Site Scripting (1.16.65)
Ruby Improper Restriction of XML External Entity Reference Vulnerability (CVE-2021-28965)
Oracle Database Server CVE-2015-4923 Vulnerability (CVE-2015-4923)