The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site.
References
Configurations
History
21 Nov 2024, 08:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.0/inc/shortcodes.php#L28 - Third Party Advisory | |
References | () https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.1/inc/shortcodes.php?rev=2972840#L24 - Third Party Advisory | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=cve - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
07 Nov 2023, 04:23
Type | Values Removed | Values Added |
---|---|---|
CWE |
11 Oct 2023, 16:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
First Time |
Rickbeckman openhook
Rickbeckman |
|
CPE | cpe:2.3:a:rickbeckman:openhook:*:*:*:*:wordpress:*:*:* | |
References | (MISC) https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.1/inc/shortcodes.php?rev=2972840#L24 - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.0/inc/shortcodes.php#L28 - Third Party Advisory | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2da-8d103e4c31bf?source=cve - Third Party Advisory |
30 Sep 2023, 03:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-30 03:15
Updated : 2024-11-21 08:41
NVD link : CVE-2023-5201
Mitre link : CVE-2023-5201
CVE.ORG link : CVE-2023-5201
JSON object : View
Products Affected
rickbeckman
- openhook
CWE
No CWE.