The Custom Field Suite plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.6.7 via the Loop custom field. This is due to insufficient sanitization of input prior to being used in a call to the eval() function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code on the server.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-32148 | The Custom Field Suite plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.6.7 via the Loop custom field. This is due to insufficient sanitization of input prior to being used in a call to the eval() function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code on the server. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T20:12:07.661Z
Reserved: 2024-04-09T21:43:05.718Z
Link: CVE-2024-3562
Updated: 2024-08-01T20:12:07.661Z
Status : Modified
Published: 2024-06-20T02:15:10.140
Modified: 2024-11-21T09:29:52.887
Link: CVE-2024-3562
No data.
OpenCVE Enrichment
No data.
EUVD