The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
                
            References
                    Configurations
                    History
                    27 Sep 2024, 16:12
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/simple-spoiler/trunk/simple-spoiler.php#L108 - Product | |
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3151179%40simple-spoiler&new=3151179%40simple-spoiler&sfp_email=&sfph_mail= - Patch | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/8ffc76d8-b841-4c26-bbc6-1f96664efe36?source=cve - Third Party Advisory | |
| Summary | 
 | |
| CPE | cpe:2.3:a:webliberty:simple_spoiler:*:*:*:*:*:wordpress:*:* | |
| First Time | Webliberty Webliberty simple Spoiler | 
14 Sep 2024, 04:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-09-14 04:15
Updated : 2024-09-27 16:12
NVD link : CVE-2024-8479
Mitre link : CVE-2024-8479
CVE.ORG link : CVE-2024-8479
JSON object : View
Products Affected
                webliberty
- simple_spoiler
CWE
                
                    
                        
                        CWE-94
                        
            Improper Control of Generation of Code ('Code Injection')
