J-Security Center

Title: WordPress 'wp-login.php' Admin Password Reset Security Bypass Vulnerability

Severity: MODERATE


WordPress is a web-based publishing application implemented in PHP.

The application is prone to a security-bypass vulnerability related to the password-reset feature. This issue occurs because the application fails to properly validate user input in the form of activation keys that are arrays. Specifically, the vulnerability lies in the 'reset_password()' function of the 'wp-login.php' file.

An attacker can exploit this issue to reset the administrator password of the application. Repeated attacks may allow the attacker to cause persistent denial-of-service conditions.

WordPress 2.8.3 is affected; other versions may also be vulnerable.

Affected Products:

  • RedHat Fedora 10
  • RedHat Fedora 11
  • WordPress WordPress 2.8.3


Juniper Networks provides this content via a wide variety of sources and production methods. If notified of errors or omissions in the content of this page, Juniper Networks, at its discretion, will modify or remove the page or leave the content as is, depending on various factors including but not limited to the reputation and authority of the party providing the notification. Please use the contact information displayed elsewhere on this page to report any errors or omissions regarding the content on this page.