U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2024-9061

Change History

New CVE Received from Wordfence 10/16/2024 4:15:07 AM

Action Type Old Value New Value
Added Description

								
							
							
						
The The WP Popup Builder – Popup Forms and Marketing Lead Generation plugin for WordPress is vulnerable to arbitrary shortcode execution via the wp_ajax_nopriv_shortcode_Api_Add AJAX action in all versions up to, and including, 1.3.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. NOTE: This vulnerability was partially fixed in version 1.3.5 with a nonce check, which effectively prevented access to the affected function. However, version 1.3.6 incorporates the correct authorization check to prevent unauthorized access.
Added CVSS V3.1

								
							
							
						
Wordfence AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Added CWE

								
							
							
						
Wordfence CWE-94
Added Reference

								
							
							
						
Wordfence https://plugins.trac.wordpress.org/changeset/3166506/wp-popup-builder [No types assigned]
Added Reference

								
							
							
						
Wordfence https://www.wordfence.com/threat-intel/vulnerabilities/id/0cac1dc0-87dc-43eb-9db1-638a91200b43?source=cve [No types assigned]