Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-54191 | The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 12 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sksdev
Sksdev allow Php Execute |
|
| CPEs | cpe:2.3:a:sksdev:allow_php_execute:1.0:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Sksdev
Sksdev allow Php Execute |
Mon, 10 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 08 Mar 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages. | |
| Title | Allow PHP Execute <= 1.0 - Authenticated (Editor+) PHP Code Injection | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-03-10T16:04:08.346Z
Reserved: 2025-02-19T19:15:18.599Z
Link: CVE-2024-13890
Updated: 2025-03-10T16:04:05.268Z
Status : Analyzed
Published: 2025-03-08T03:15:36.920
Modified: 2025-03-12T16:48:41.693
Link: CVE-2024-13890
No data.
OpenCVE Enrichment
No data.
EUVD