The Tickera – WordPress Event Ticketing plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
References
Configurations
History
08 Nov 2024, 15:59
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tickera tickera
Tickera |
|
CPE | cpe:2.3:a:tickera:tickera:*:*:*:*:*:wordpress:*:* | |
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset/3179272/tickera-event-ticketing-system - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/6e5e9249-9705-4cfa-9c8e-2e002190562b?source=cve - Third Party Advisory |
05 Nov 2024, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-11-05 13:15
Updated : 2024-11-08 15:59
NVD link : CVE-2024-10263
Mitre link : CVE-2024-10263
CVE.ORG link : CVE-2024-10263
JSON object : View
Products Affected
tickera
- tickera
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')