{"id":"CVE-2007-1897","details":"SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable.","modified":"2026-04-10T03:38:47.460963Z","published":"2007-04-09T20:19:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/24751"},{"type":"ADVISORY","url":"http://secunia.com/advisories/25108"},{"type":"ADVISORY","url":"http://www.debian.org/security/2007/dsa-1285"},{"type":"ADVISORY","url":"http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/23294"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/1245"},{"type":"EVIDENCE","url":"http://www.notsosecure.com/folder2/2007/04/03/wordpress-212-xmlrpc-security-issues/"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/23294"},{"type":"FIX","url":"http://secunia.com/advisories/24751"},{"type":"WEB","url":"http://trac.wordpress.org/ticket/4091"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/3656"}],"schema_version":"1.7.5"}