9.9
CVE-2023-5201
- EPSS 7%
- Veröffentlicht 30.09.2023 03:15:09
- Zuletzt bearbeitet 21.11.2024 08:41:17
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
OpenHook <= 4.3.0 - Authenticated (Subscriber+) Remote Code Execution via Shortcode
The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site.
Mögliche Gegenmaßnahme
OpenHook: Update to version 4.3.1, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
OpenHook
Version
*-4.3.0
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Rickbeckman ≫ Openhook SwEditionwordpress Version <= 4.3.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 7% | 0.911 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
| security@wordfence.com | 9.9 | 3.1 | 6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
|