First published: Wed Mar 14 2018(Updated: )
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
HUSKY – Products Filter for WooCommerce | <2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8710 has been assigned a high severity rating due to its potential for remote code execution.
To fix CVE-2018-8710, update the WooCommerce Products Filter plugin to version 2.2.0 or later.
CVE-2018-8710 affects WooCommerce Products Filter versions prior to 2.2.0 installed on WordPress sites.
Yes, CVE-2018-8710 can be exploited remotely due to its AJAX functionality that does not require authentication.
The potential impacts of CVE-2018-8710 include unauthorized remote code execution, which can lead to site compromise.