{"id":"DEBIAN-CVE-2011-4898","details":"wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier generates different error messages for requests lacking a dbname parameter depending on whether the MySQL credentials are valid, which makes it easier for remote attackers to conduct brute-force attacks via a series of requests with different uname and pwd parameters.  NOTE: the vendor disputes the significance of this issue; also, it is unclear whether providing intentionally vague error messages during installation would be reasonable from a usability perspective","modified":"2026-04-28T20:07:26.787254Z","published":"2012-01-30T17:55:00.687Z","upstream":["CVE-2011-4898"],"references":[{"type":"ADVISORY","url":"https://security-tracker.debian.org/tracker/CVE-2011-4898"}],"affected":[{"package":{"name":"wordpress","ecosystem":"Debian:11","purl":"pkg:deb/debian/wordpress?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["5.7.1+dfsg1-2","5.7.11+dfsg1-0+deb11u1","5.7.14+dfsg1-0+deb11u1","5.7.3+dfsg1-0+deb11u1","5.7.5+dfsg1-0+deb11u1","5.7.8+dfsg1-0+deb11u1","5.7.8+dfsg1-0+deb11u2","5.8.1+dfsg1-1","5.8.1+dfsg1-2","5.8.2+dfsg1-1","5.8.3+dfsg1-1","5.9.2+dfsg1-1","5.9.2+dfsg1-2","6.0+dfsg1-1","6.0.2+dfsg1-1","6.0.3+dfsg1-1","6.1+dfsg1-1","6.1.1+dfsg1-1","6.2+dfsg1-1","6.2.1+dfsg1-1","6.2.2+dfsg1-1","6.3+dfsg1-1","6.3.1+dfsg1-1","6.3.2+dfsg1-1","6.4.1+dfsg1-1","6.4.1+dfsg1-1.1","6.4.2+dfsg1-1","6.4.3+dfsg1-1","6.5+dfsg1-1","6.5.2+dfsg1-1","6.5.3+dfsg1-1","6.5.5+dfsg1-1","6.6.1+dfsg1-1","6.7.2+dfsg1-1","6.7.2+dfsg1-1.1","6.8.1+dfsg1-1","6.8.3+dfsg1-1","6.9+dfsg1-1","6.9.4+dfsg1-1"],"ecosystem_specific":{"urgency":"unimportant"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4898.json"}},{"package":{"name":"wordpress","ecosystem":"Debian:12","purl":"pkg:deb/debian/wordpress?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["6.1.1+dfsg1-1","6.1.6+dfsg1-0+deb12u1","6.1.9+dfsg1-0+deb12u1","6.2+dfsg1-1","6.2.1+dfsg1-1","6.2.2+dfsg1-1","6.3+dfsg1-1","6.3.1+dfsg1-1","6.3.2+dfsg1-1","6.4.1+dfsg1-1","6.4.1+dfsg1-1.1","6.4.2+dfsg1-1","6.4.3+dfsg1-1","6.5+dfsg1-1","6.5.2+dfsg1-1","6.5.3+dfsg1-1","6.5.5+dfsg1-1","6.6.1+dfsg1-1","6.7.2+dfsg1-1","6.7.2+dfsg1-1.1","6.8.1+dfsg1-1","6.8.3+dfsg1-1","6.9+dfsg1-1","6.9.4+dfsg1-1"],"ecosystem_specific":{"urgency":"unimportant"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4898.json"}},{"package":{"name":"wordpress","ecosystem":"Debian:13","purl":"pkg:deb/debian/wordpress?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["6.8.1+dfsg1-1","6.8.3+dfsg1-0+deb13u1","6.8.3+dfsg1-1","6.9+dfsg1-1","6.9.4+dfsg1-1"],"ecosystem_specific":{"urgency":"unimportant"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4898.json"}},{"package":{"name":"wordpress","ecosystem":"Debian:14","purl":"pkg:deb/debian/wordpress?arch=source"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["6.8.1+dfsg1-1","6.8.3+dfsg1-1","6.9+dfsg1-1","6.9.4+dfsg1-1"],"ecosystem_specific":{"urgency":"unimportant"},"database_specific":{"source":"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2011-4898.json"}}],"schema_version":"1.7.5"}