{"id":"CVE-2007-4894","details":"Multiple SQL injection vulnerabilities in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a allow remote attackers to execute arbitrary SQL commands via the post_type parameter to the pingback.extensions.getPingbacks method in the XMLRPC interface, and other unspecified parameters related to \"early database escaping\" and missing validation of \"query string like parameters.\"","modified":"2026-04-10T03:39:15.046193Z","published":"2007-09-14T18:17:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/26771"},{"type":"ADVISORY","url":"http://secunia.com/advisories/26796"},{"type":"ADVISORY","url":"http://www.buayacorp.com/files/wordpress/wordpress-sql-injection-advisory.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2007/3132"},{"type":"FIX","url":"http://wordpress.org/development/2007/09/wordpress-223/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=285831"},{"type":"WEB","url":"http://fedoranews.org/updates/FEDORA-2007-214.shtml"},{"type":"WEB","url":"http://trac.wordpress.org/ticket/4770"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/36578"}],"schema_version":"1.7.5"}