CVE-2006-4992

N/A Unknown
Published: September 26, 2006 Modified: April 16, 2026
View on NVD

Description

Multiple PHP remote file inclusion vulnerabilities in JD-WordPress for Joomla! (com_jd-wp) 2.0-1.0 RC2 allow remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter in (1) wp-comments-post.php, (2) wp-feed.php, or (3) wp-trackback.php.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.babilonics.com/?q=node/1802
Source: cve@mitre.org
Exploit
http://www.osvdb.org/28997
Source: cve@mitre.org
Exploit
http://www.osvdb.org/28998
Source: cve@mitre.org
Exploit
http://www.osvdb.org/28999
Source: cve@mitre.org
Exploit
http://www.securityfocus.com/bid/19209
Source: cve@mitre.org
Exploit
http://forum.joomla.org/index.php/topic%2C79477.0.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://forum.joomla.org/index.php/topic%2C81064.0.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.babilonics.com/?q=node/1802
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/28997
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/28998
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.osvdb.org/28999
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.securityfocus.com/bid/19209
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit

14 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
6.2%
91th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

joomla