The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages.
References
Configurations
History
12 Mar 2025, 16:48
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CPE | cpe:2.3:a:sksdev:allow_php_execute:1.0:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/allow-php-execute/trunk/allow-php-execute.php#L10 - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/412c39e9-9378-4c2c-817c-8d37f156af6e?source=cve - Third Party Advisory | |
First Time |
Sksdev allow Php Execute
Sksdev |
08 Mar 2025, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-08 03:15
Updated : 2025-03-12 16:48
NVD link : CVE-2024-13890
Mitre link : CVE-2024-13890
CVE.ORG link : CVE-2024-13890
JSON object : View
Products Affected
sksdev
- allow_php_execute
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')