← Volver a CVEs
CVE-2018-8710
N/ADescripcion
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/14/2018
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
woocommerce-filter:woocommerce_products_filter
Debilidades (CWE)
CWE-287
Referencias
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html(cve@mitre.org)
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html(af854a3a-2127-422b-91ae-364da2661108)
https://wordpress.org/plugins/woocommerce-products-filter/#developers(af854a3a-2127-422b-91ae-364da2661108)
https://www.woocommerce-filter.com/update-woocommerce-products-filter-v-2-2-0/(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.