CVE-2023-5201
moderate-risk
Published 2023-09-30
The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site.
Do I need to act?
~
7.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.9/10
Critical
NETWORK
/ LOW complexity
Affected Products (1)
Openhook
Affected Vendors
References (6)
Third Party Advisory
https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.0/inc/shortc...
Third Party Advisory
https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.1/inc/shortc...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2d...
Third Party Advisory
https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.0/inc/shortc...
Third Party Advisory
https://plugins.trac.wordpress.org/browser/thesis-openhook/tags/4.3.1/inc/shortc...
Third Party Advisory
https://www.wordfence.com/threat-intel/vulnerabilities/id/37b9ed0e-5af2-47c1-b2d...
47
/ 100
moderate-risk
Severity
33/34 · Critical
Exploitability
9/34 · Low
Exposure
5/34 · Minimal