Vulnerability Description
The The MDTF – Meta Data and Taxonomies Filter plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.3.3.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pluginus | Wordpress Meta Data And Taxonomies Filter | < 1.3.3.4 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/wp-meta-data-filter-and-taxonomy-filtProduct
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&oldPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/ba584e02-5242-4869-a45Third Party Advisory
FAQ
What is CVE-2024-8623?
CVE-2024-8623 is a vulnerability with a CVSS score of 7.3 (HIGH). The The MDTF – Meta Data and Taxonomies Filter plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.3.3.3. This is due to the software allowing u...
How severe is CVE-2024-8623?
CVE-2024-8623 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-8623?
Check the references section above for vendor advisories and patch information. Affected products include: Pluginus Wordpress Meta Data And Taxonomies Filter.