Description
The Custom Field Suite plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.6.7 via the Loop custom field. This is due to insufficient sanitization of input prior to being used in a call to the eval() function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code on the server.
Published: 2024-06-20
Score: 8.8 High
EPSS: 1.1% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-32148 The Custom Field Suite plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.6.7 via the Loop custom field. This is due to insufficient sanitization of input prior to being used in a call to the eval() function. This makes it possible for authenticated attackers, with contributor-level access and above, to execute arbitrary PHP code on the server.
History

No history.

Subscriptions

Custom Field Suite Project Custom Field Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-08-01T20:12:07.661Z

Reserved: 2024-04-09T21:43:05.718Z

Link: CVE-2024-3562

cve-icon Vulnrichment

Updated: 2024-08-01T20:12:07.661Z

cve-icon NVD

Status : Modified

Published: 2024-06-20T02:15:10.140

Modified: 2024-11-21T09:29:52.887

Link: CVE-2024-3562

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses