The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages.
Metrics
Affected Vendors & Products
References
History
Mon, 10 Mar 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 08 Mar 2025 02:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Allow PHP Execute plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0. This is due to allowing PHP code to be entered by all users for whom unfiltered HTML is allowed. This makes it possible for authenticated attackers, with Editor-level access and above, to inject PHP code into posts and pages. | |
Title | Allow PHP Execute <= 1.0 - Authenticated (Editor+) PHP Code Injection | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-03-08T02:24:03.309Z
Updated: 2025-03-10T16:04:08.346Z
Reserved: 2025-02-19T19:15:18.599Z
Link: CVE-2024-13890

Updated: 2025-03-10T16:04:05.268Z

Status : Received
Published: 2025-03-08T03:15:36.920
Modified: 2025-03-08T03:15:36.920
Link: CVE-2024-13890

No data.