Description
The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Silverlight Media Player Cross-Site Scripting (0.8)
WordPress Plugin Photoracer 'id' Parameter SQL Injection (1.0)
WordPress Plugin AccessPress Social Icons Multiple Cross-Site Scripting Vulnerabilities (1.5.5)
Apache Traffic Server CVE-2023-30631 Vulnerability (CVE-2023-30631)
Zope Web Application Server Resource Management Errors Vulnerability (CVE-2008-5102)