Input validation vulnerability in WordPress 1.5.1.3

WordPress versions 1.5.1.2 and earlier contain a vulnerability that allows remote attackers to execute malicious code. This vulnerability is found in the XMLRPC server and is caused by input that is not filtered properly. This unfiltered input is stored in an XML file called HTTP_RAW_POST_DATA

Detected in:

WordPress fixed vulnerable versions: >= * < 1.5.1.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.