{"id":"CVE-2007-4154","details":"SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components.","modified":"2026-04-10T03:39:01.078941Z","published":"2007-08-03T20:17:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/30013"},{"type":"ADVISORY","url":"http://www.debian.org/security/2008/dsa-1564"},{"type":"ARTICLE","url":"http://mybeni.rootzilla.de/mybeNi/2007/wordpress_zeroday_vulnerability_roundhouse_kick_and_why_i_nearly_wrote_the_first_blog_worm/"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35719"}],"schema_version":"1.7.5"}