WordPress through 4.8.2 uses a weak MD5-based password hashing algorithm, which makes it easier for attackers to determine cleartext values by leveraging access to the hash values. NOTE: the approach to changing this may not be fully compatible with certain use cases, such as migration of a WordPress site from a web host that uses a recent PHP version to a different web host that uses PHP 5.2. These use cases are plausible (but very unlikely) based on statistics showing widespread deployment of WordPress with obsolete PHP versions.
                
            References
                    | Link | Resource | 
|---|---|
| https://core.trac.wordpress.org/ticket/21022 | Issue Tracking Patch Vendor Advisory | 
| https://core.trac.wordpress.org/ticket/21022 | Issue Tracking Patch Vendor Advisory | 
Configurations
                    History
                    21 Nov 2024, 01:46
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://core.trac.wordpress.org/ticket/21022 - Issue Tracking, Patch, Vendor Advisory | 
Information
                Published : 2017-10-19 19:29
Updated : 2025-04-20 01:37
NVD link : CVE-2012-6707
Mitre link : CVE-2012-6707
CVE.ORG link : CVE-2012-6707
JSON object : View
Products Affected
                wordpress
- wordpress
CWE
                
                    
                        
                        CWE-326
                        
            Inadequate Encryption Strength
