Remote Code Execution Vulnerability in WP Extended Plugin for WordPress
CVE-2024-11816

8.8HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
8 January 2025

Summary

The WP Extended plugin for WordPress is exposed to a vulnerability that permits authenticated attackers with Subscriber-level access or higher to execute arbitrary code on the server. This vulnerability arises from the absence of a capability check in the 'wpext_handle_snippet_update' function. If an admin has created at least one code snippet, this weakness can be exploited, leading to severe security risks for affected WordPress installations.

Affected Version(s)

The Ultimate WordPress Toolkit – WP Extended * <= 3.0.11

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Matthew Rollings
.