Vulnerability Details : CVE-2023-6999
The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server.
Vulnerability category: Execute code
Products affected by CVE-2023-6999
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
- cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6999
1.50%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6999
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
Wordfence | 2024-04-09 |
References for CVE-2023-6999
-
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=
429 Too Many RequestsProduct
-
https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve
Pods - Custom Content Types and Fields - Authenticated (Contributor+) Remote Code ExecutionThird Party Advisory
-
https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750
429 Too Many RequestsProduct
Jump to