The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
History

Fri, 27 Sep 2024 16:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:webliberty:simple_spoiler:*:*:*:*:*:wordpress:*:*

Tue, 17 Sep 2024 02:30:00 +0000

Type Values Removed Values Added
First Time appeared Webliberty
Webliberty simple Spoiler
CPEs cpe:2.3:a:webliberty:simple_spoiler:*:*:*:*:*:*:*:*
Vendors & Products Webliberty
Webliberty simple Spoiler
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 14 Sep 2024 03:30:00 +0000

Type Values Removed Values Added
Description The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Title Simple Spoiler 1.2 - 1.3 - Unauthenticated Arbitrary Shortcode Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-14T03:19:28.119Z

Updated: 2024-09-16T19:11:05.482Z

Reserved: 2024-09-05T15:17:31.811Z

Link: CVE-2024-8479

cve-icon Vulnrichment

Updated: 2024-09-16T19:10:56.276Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-14T04:15:04.733

Modified: 2024-09-27T16:12:10.427

Link: CVE-2024-8479

cve-icon Redhat

No data.