← Retour aux CVEs
CVE-2018-8710
N/ADescription
A remote code execution issue was discovered in the WooCommerce Products Filter (aka WOOF) plugin before 2.2.0 for WordPress, as demonstrated by the shortcode parameter in a woof_redraw_woof action. The plugin implemented a page redraw AJAX function accessible to anyone without any authentication. WordPress shortcode markup in the "shortcode" parameters would be evaluated. Normally unauthenticated users can't evaluate shortcodes as they are often sensitive.
Details CVE
Score CVSS v3.1N/A
Publie3/14/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
woocommerce-filter:woocommerce_products_filter
Faiblesses (CWE)
CWE-287
References
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html(cve@mitre.org)
https://sec-consult.com/en/blog/advisories/arbitrary-shortcode-execution-local-file-inclusion-in-woof-pluginus-net/index.html(af854a3a-2127-422b-91ae-364da2661108)
https://wordpress.org/plugins/woocommerce-products-filter/#developers(af854a3a-2127-422b-91ae-364da2661108)
https://www.woocommerce-filter.com/update-woocommerce-products-filter-v-2-2-0/(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.