CVE-2018-8710
WOOF - Products Filter for WooCommerce <= 1.1.9 - Remote Code Execution
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
Se ha descubierto un problema de ejecución remota de código en el plugin WooCommerce Products Filter (también conocido como WOOF), en versiones anteriores a la 2.2.0, para WordPress, tal y como demuestra el parámetro shortcode en una acción woof_redraw_woof. El plugin implementó una función AJAX de rediseño de página accesible para cualquiera sin ningún tipo de autenticación. El marcado de código corto de WordPress en los parámetros "shortcode" se evaluaría. Los usuarios que no suelen estar autenticados no pueden evaluar códigos cortos, ya que suelen ser sensibles.
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 1.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-03-06 CVE Published
- 2018-03-14 CVE Reserved
- 2024-09-16 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
- CWE-287: Improper Authentication
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html | Third Party Advisory | |
https://wordpress.org/plugins/woocommerce-products-filter/#developers | Release Notes |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.woocommerce-filter.com/update-woocommerce-products-filter-v-2-2-0 | 2019-10-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Woocommerce-filter Search vendor "Woocommerce-filter" | Woocommerce Products Filter Search vendor "Woocommerce-filter" for product "Woocommerce Products Filter" | < 2.2.0 Search vendor "Woocommerce-filter" for product "Woocommerce Products Filter" and version " < 2.2.0" | wordpress |
Affected
|