cve/2024/CVE-2024-8479.md
2025-09-29 21:09:30 +02:00

20 lines
990 B
Markdown

### [CVE-2024-8479](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8479)
![](https://img.shields.io/static/v1?label=Product&message=Simple%20Spoiler&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=1.2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brightgreen)
### Description
The The Simple Spoiler plugin for WordPress is vulnerable to arbitrary shortcode execution in versions 1.2 to 1.3. This is due to the plugin adding the filter add_filter('comment_text', 'do_shortcode'); which will run all shortcodes in comments. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates
- https://github.com/cyb3r-w0lf/nuclei-template-collection
- https://github.com/fkie-cad/nvd-json-data-feeds