CVE-2024-49254
WordPress ajax-extend plugin <= 1.0 - Remote Code Execution (RCE) vulnerability
Severity Score
10.0
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
Improper Control of Generation of Code ('Code Injection') vulnerability in Sunjianle allows Code Injection.This issue affects ajax-extend: from n/a through 1.0.
La vulnerabilidad de control inadecuado de generación de código ('Inyección de código') en Sunjianle permite la inyección de código. Este problema afecta a ajax-extend: desde n/a hasta 1.0.
The ajax-extend plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0 via the ajax_operation function. This is due to plugin not properly restricting user input to call_user_func(). This makes it possible for unauthenticated attackers to execute code on the server.
*Credits:
stealthcopter (Patchstack Alliance)
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-10-14 CVE Reserved
- 2024-10-14 CVE Published
- 2024-10-18 CVE Updated
- 2025-04-15 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
- CAPEC-242: Code Injection
References (1)
URL | Tag | Source |
---|---|---|
https://patchstack.com/database/vulnerability/ajax-extend/wordpress-ajax-extend-plugin-1-0-remote-code-execution-rce-vulnerability?_s_id=cve | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ajax Extend Search vendor "Ajax Extend" | Ajax Extend Search vendor "Ajax Extend" for product "Ajax Extend" | >= 0.0 <= 1.0 Search vendor "Ajax Extend" for product "Ajax Extend" and version " >= 0.0 <= 1.0" | en |
Affected
|