The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.3 via the 'dfads_ajax_load_ads' function. This allows unauthenticated attackers to execute code on the server. The parameters of the callable function are limited, they cannot be specified arbitrarily.
References
Configurations
History
13 Nov 2023, 15:14
Type | Values Removed | Values Added |
---|---|---|
First Time |
Datafeedr
Datafeedr ads By Datafeedr.com |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CPE | cpe:2.3:a:datafeedr:ads_by_datafeedr.com:*:*:*:*:*:wordpress:*:* | |
CWE | NVD-CWE-noinfo | |
References | (MISC) https://www.wordfence.com/threat-intel/vulnerabilities/id/5412fd87-49bc-445c-8d16-443e38933d1e?source=cve - Third Party Advisory | |
References | (MISC) https://plugins.trac.wordpress.org/browser/ads-by-datafeedrcom/tags/1.1.3/inc/dfads.class.php#L34 - Exploit |
07 Nov 2023, 04:24
Type | Values Removed | Values Added |
---|---|---|
CWE |
30 Oct 2023, 14:32
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-10-30 14:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-5843
Mitre link : CVE-2023-5843
CVE.ORG link : CVE-2023-5843
JSON object : View
Products Affected
datafeedr
- ads_by_datafeedr.com
CWE