CVE-2024-9837

Improper Control of Generation of Code ('Code Injection') (CWE-94)

Published: Oct 15, 2024 / Updated: 35d ago

010
CVSS 7.3EPSS 0.05%High
CVE info copied to clipboard

The The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Timeline

First Article

Feedly found the first article mentioning CVE-2024-9837. See article

Oct 15, 2024 at 7:40 AM / CVE
CVE Assignment

NVD published the first details for CVE-2024-9837

Oct 15, 2024 at 8:15 AM
CVSS

A CVSS base score of 7.3 has been assigned.

Oct 15, 2024 at 8:15 AM / nvd
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Oct 15, 2024 at 8:18 AM
EPSS

EPSS Score was set to: 0.05% (Percentile: 21.2%)

Oct 16, 2024 at 11:00 AM
Static CVE Timeline Graph

Affected Systems

Wordpress/wordpress
+null more

Attack Patterns

CAPEC-242: Code Injection
+null more

References

Weekly Intelligence Report - 18 Oct 2024 | #ransomware | #cybercrime
DarkVision RAT establishes a presence on infected systems by creating a registry key at HKEY_CURRENT_USER\SOFTWARE, where it stores three critical values, each identified by a hardcoded GUID. Moreover, PureCrypter ensures the persistence of DarkVision RAT by writing the current file to `%APPDATA%\Sighul.exe` and configuring the Auto-run registry key `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run` to maintain persistence with the name set to Sighul.
Weekly Intelligence Report - 18 Oct 2024
DarkVision RAT establishes a presence on infected systems by creating a registry key at HKEY_CURRENT_USER\SOFTWARE, where it stores three critical values, each identified by a hardcoded GUID. Moreover, PureCrypter ensures the persistence of DarkVision RAT by writing the current file to `%APPDATA%\Sighul.exe` and configuring the Auto-run registry key `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run` to maintain persistence with the name set to Sighul.

News

Update Sun Oct 27 14:34:00 UTC 2024
Update Sun Oct 27 14:34:00 UTC 2024
Wordfence Intelligence Weekly WordPress Vulnerability Report (October 14, 2024 to October 20, 2024)
The team rolled out enhanced protection via firewall rules for the following vulnerabilities in real-time to our Premium, Care, and Response customers last week: WordPress Plugins with Reported Vulnerabilities Last Week
Weekly Intelligence Report - 18 Oct 2024 | #ransomware | #cybercrime
DarkVision RAT establishes a presence on infected systems by creating a registry key at HKEY_CURRENT_USER\SOFTWARE, where it stores three critical values, each identified by a hardcoded GUID. Moreover, PureCrypter ensures the persistence of DarkVision RAT by writing the current file to `%APPDATA%\Sighul.exe` and configuring the Auto-run registry key `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run` to maintain persistence with the name set to Sighul.
Weekly Intelligence Report - 18 Oct 2024
DarkVision RAT establishes a presence on infected systems by creating a registry key at HKEY_CURRENT_USER\SOFTWARE, where it stores three critical values, each identified by a hardcoded GUID. Moreover, PureCrypter ensures the persistence of DarkVision RAT by writing the current file to `%APPDATA%\Sighul.exe` and configuring the Auto-run registry key `HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run` to maintain persistence with the name set to Sighul.
High - CVE-2024-9837 - The The AADMY – Add Auto Date Month Year Into...
The The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.1. This is due to the software...
See 7 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:Low
Integrity:Low
Availability Impact:Low

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI