The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
References
Configurations
History
27 Sep 2024, 16:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Webliberty simple Spoiler
Webliberty |
|
Summary |
|
|
CPE | cpe:2.3:a:webliberty:simple_spoiler:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/browser/simple-spoiler/trunk/simple-spoiler.php#L108 - Product | |
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151179%40simple-spoiler&new=3151179%40simple-spoiler&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8ffc76d8-b841-4c26-bbc6-1f96664efe36?source=cve - Third Party Advisory |
14 Sep 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-14 04:15
Updated : 2024-09-27 16:12
NVD link : CVE-2024-8479
Mitre link : CVE-2024-8479
CVE.ORG link : CVE-2024-8479
JSON object : View
Products Affected
webliberty
- simple_spoiler
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')