First published: Tue Apr 09 2024(Updated: )
The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pods Custom Content Types and Fields | <=3.0.10 | |
Pods Foundation | <2.7.31.2 | |
Pods Foundation | >=2.8<2.8.23.2 | |
Pods Foundation | >=2.9<2.9.19.2 | |
Pods Foundation | >=3.0.0<3.0.10.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6999 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2023-6999, update the Pods – Custom Content Types and Fields plugin to version 3.0.11 or later.
CVE-2023-6999 affects all versions of the Pods – Custom Content Types and Fields plugin up to and including 3.0.10.
CVE-2023-6999 enables authenticated attackers to execute arbitrary code via a vulnerable shortcode.
An attacker needs contributor level access to exploit CVE-2023-6999.