Description
wp-admin/setup-config.php in the installation component in WordPress 3.3.1 and earlier does not ensure that the specified MySQL database service is appropriate, which allows remote attackers to configure an arbitrary database via the dbhost and dbname parameters, and subsequently conduct static code injection and cross-site scripting (XSS) attacks via (1) an HTTP request or (2) a MySQL query. NOTE: the vendor disputes the significance of this issue; however, remote code execution makes the issue important in many realistic environments
Published: 2012-01-30
Score: 7.5 High
EPSS: 5.9% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 15 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.01292}

epss

{'score': 0.02951}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-09-16T19:05:06.613Z

Reserved: 2011-12-23T00:00:00.000Z

Link: CVE-2011-4899

cve-icon Vulnrichment

Updated: 2024-05-08T15:56:51.831Z

cve-icon NVD

Status : Modified

Published: 2012-01-30T17:55:00.750

Modified: 2026-04-29T01:13:23.040

Link: CVE-2011-4899

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses