// For flags

CVE-2024-9061

WP Popup Builder – Popup Forms and Marketing Lead Generation <= 1.3.5 - Unauthenticated Arbitrary Shortcode Execution via wp_ajax_nopriv_shortcode_Api_Add

Severity Score

7.3
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access.

El complemento The WP Popup Builder – Popup Forms and Marketing Lead Generation para WordPress es vulnerable a la ejecución de shortcode arbitrario a través de la acción AJAX wp_ajax_nopriv_shortcode_Api_Add en todas las versiones hasta la 1.3.5 incluida. Esto se debe a que el software permite a los usuarios ejecutar una acción que no valida correctamente un valor antes de ejecutar do_shortcode. Esto hace posible que atacantes no autenticados ejecuten shortcodes arbitrarios. NOTA: Esta vulnerabilidad se solucionó parcialmente en la versión 1.3.5 con una comprobación de nonce, que impidió de manera efectiva el acceso a la función afectada. Sin embargo, la versión 1.3.6 incorpora la comprobación de autorización correcta para evitar el acceso no autorizado.

*Credits: Francesco Carlucci
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-09-20 CVE Reserved
  • 2024-10-15 CVE Published
  • 2024-10-16 CVE Updated
  • 2024-10-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Themehunk
Search vendor "Themehunk"
WP Popup Builder – Popup Forms And Marketing Lead Generation
Search vendor "Themehunk" for product "WP Popup Builder – Popup Forms And Marketing Lead Generation"
<= 1.3.5
Search vendor "Themehunk" for product "WP Popup Builder – Popup Forms And Marketing Lead Generation" and version " <= 1.3.5"
en
Affected