Description
WordPress is prone to multiple vulnerabilities, including cross-site scripting and arbitrary file upload vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks or to upload arbitrary PHP code and run it in the context of the Web server process, which may facilitate unauthorized access or privilege escalation. WordPress versions prior to 2.8.6 are vulnerable.
Remediation
Update to WordPress version 2.8.6 or latest
References
http://www.securityfocus.com/archive/1/507819
http://www.exploit-db.com/exploits/10089/
http://packetstormsecurity.org/files/view/82675/wordpress285-exec.txt
http://secunia.com/advisories/37332/
https://wordpress.org/news/2009/11/wordpress-2-8-6-security-release/
Related Vulnerabilities
Joomla! Core 2.5.x Security Bypass (2.5.0 - 2.5.24)
WordPress 4.5.x Same Origin Method Execution (SOME) Vulnerability (4.5 - 4.5.1)
WordPress Plugin Breeze-WordPress Cache Open Redirect (1.0.10)
WordPress Plugin Wow Forms-create any form with custom style SQL Injection (3.1.3)
WordPress Plugin Advanced Custom Fields:reCAPTCHA Field Security Bypass (1.1.1)