{"url":"http://public2.vulnerablecode.io/api/packages/942955?format=json","purl":"pkg:deb/debian/wordpress@2.5.0-1?distro=trixie","type":"deb","namespace":"debian","name":"wordpress","version":"2.5.0-1","qualifiers":{"distro":"trixie"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.5.0-2","latest_non_vulnerable_version":"6.9.4+dfsg1-1","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/14153?format=json","vulnerability_id":"VCID-ba3v-4d8e-mfgx","summary":"Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')\nThe _bad_protocol_once function in phpgwapi/inc/class.kses.inc.php in KSES, as used in eGroupWare before 1.4.003, Moodle before 1.8.5, and other products, allows remote attackers to bypass HTML filtering and conduct cross-site scripting (XSS) attacks via a string containing crafted URL protocols.","references":[{"reference_url":"http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://docs.moodle.org/en/Release_Notes#Moodle_1.8.5"},{"reference_url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://lists.opensuse.org/opensuse-security-announce/2008-07/msg00006.html"},{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2008-1502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1502","reference_id":"","reference_type":"","scores":[{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77999","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77989","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77976","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77968","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77935","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77941","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77942","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77905","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77921","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77889","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77845","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.78027","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.7788","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77853","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01086","scoring_system":"epss","scoring_elements":"0.77862","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2008-1502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-1502"},{"reference_url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41435","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41435"},{"reference_url":"https://github.com/moodle/moodle","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://github.com/moodle/moodle"},{"reference_url":"https://usn.ubuntu.com/658-1","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://usn.ubuntu.com/658-1"},{"reference_url":"https://usn.ubuntu.com/658-1/","reference_id":"","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/658-1/"},{"reference_url":"https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20080709031015/http://www.securityfocus.com/bid/28424"},{"reference_url":"https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20080828131802/http://secunia.com/advisories/31017"},{"reference_url":"https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20080905011948/http://secunia.com/advisories/31018"},{"reference_url":"https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20081011001554/http://secunia.com/advisories/31167"},{"reference_url":"https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20081025081058/http://secunia.com/advisories/32400"},{"reference_url":"https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20081028073531/http://secunia.com/advisories/32446"},{"reference_url":"https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20090129193143/http://secunia.com/advisories/30986"},{"reference_url":"https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20100819022833/http://secunia.com/advisories/30073"},{"reference_url":"https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://web.archive.org/web/20120719035305/http://secunia.com/advisories/29491"},{"reference_url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00331.html"},{"reference_url":"http://www.debian.org/security/2008/dsa-1691","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2008/dsa-1691"},{"reference_url":"http://www.debian.org/security/2009/dsa-1871","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.debian.org/security/2009/dsa-1871"},{"reference_url":"http://www.egroupware.org/changelog","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.egroupware.org/changelog"},{"reference_url":"http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.egroupware.org/viewvc/branches/1.4/phpgwapi/inc/class.kses.inc.php?r1=23625&r2=25110&pathrev=25110"},{"reference_url":"http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.gentoo.org/security/en/glsa/glsa-200805-04.xml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2008/07/08/14","reference_id":"","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"http://www.openwall.com/lists/oss-security/2008/07/08/14"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=454246","reference_id":"454246","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=454246"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243","reference_id":"504243","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=504243"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1502","reference_id":"CVE-2008-1502","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1502"},{"reference_url":"https://github.com/advisories/GHSA-v759-3wr5-p294","reference_id":"GHSA-v759-3wr5-p294","reference_type":"","scores":[{"value":"MODERATE","scoring_system":"cvssv3.1_qr","scoring_elements":""}],"url":"https://github.com/advisories/GHSA-v759-3wr5-p294"},{"reference_url":"https://security.gentoo.org/glsa/200805-04","reference_id":"GLSA-200805-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/200805-04"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942955?format=json","purl":"pkg:deb/debian/wordpress@2.5.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2008-1502","GHSA-v759-3wr5-p294"],"risk_score":3.1,"exploitability":"0.5","weighted_severity":"6.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ba3v-4d8e-mfgx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/88585?format=json","vulnerability_id":"VCID-gfey-nhj7-6fap","summary":"wordpress cookie authentication vulnerability","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6013.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2007-6013.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6013","reference_id":"","reference_type":"","scores":[{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81354","published_at":"2026-04-01T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81363","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81385","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81384","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81412","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81417","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81438","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81426","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81456","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81457","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81479","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81492","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81509","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01551","scoring_system":"epss","scoring_elements":"0.81527","published_at":"2026-05-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2007-6013"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6013","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6013"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=392411","reference_id":"392411","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=392411"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452251","reference_id":"452251","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=452251"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/942955?format=json","purl":"pkg:deb/debian/wordpress@2.5.0-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.0-1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942927?format=json","purl":"pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"},{"vulnerability":"VCID-yqam-kpce-dfg7"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942925?format=json","purl":"pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie","is_vulnerable":true,"affected_by_vulnerabilities":[{"vulnerability":"VCID-gyaq-8pvh-p7gg"},{"vulnerability":"VCID-jghn-eujf-zbdn"}],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942929?format=json","purl":"pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie"},{"url":"http://public2.vulnerablecode.io/api/packages/942928?format=json","purl":"pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie"}],"aliases":["CVE-2007-6013"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gfey-nhj7-6fap"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@2.5.0-1%3Fdistro=trixie"}