The Remote Content Shortcode plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.5 via the remote_content shortcode. This makes it possible for authenticated attackers, with contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Doublesharp
Doublesharp remote Content Shortcode |
|
CPEs | cpe:2.3:a:doublesharp:remote_content_shortcode:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Doublesharp
Doublesharp remote Content Shortcode |
Wed, 07 Aug 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-08-01T04:29:43.930Z
Updated: 2024-08-07T13:25:34.458Z
Reserved: 2024-03-01T15:17:38.321Z
Link: CVE-2024-2090
Vulnrichment
Updated: 2024-08-07T13:25:30.014Z
NVD
Status : Analyzed
Published: 2024-08-01T05:15:09.993
Modified: 2024-11-21T22:43:44.967
Link: CVE-2024-2090
Redhat
No data.