← Back to CVEs
CVE-2018-8710
N/ADescription
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
CVE Details
CVSS v3.1 ScoreN/A
Published3/14/2018
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
woocommerce-filter:woocommerce_products_filter
Weaknesses (CWE)
CWE-287
References
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html(cve@mitre.org)
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html(af854a3a-2127-422b-91ae-364da2661108)
https://wordpress.org/plugins/woocommerce-products-filter/#developers(af854a3a-2127-422b-91ae-364da2661108)
https://www.woocommerce-filter.com/update-woocommerce-products-filter-v-2-2-0/(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.