CVE-2023-6999
📋 TL;DR
The Pods WordPress plugin has a remote code execution vulnerability in its shortcode handling. Authenticated attackers with contributor-level access or higher can execute arbitrary code on the server. This affects all versions up to 3.0.10 except specific patched versions.
💻 Affected Systems
- Pods – Custom Content Types and Fields WordPress plugin
📦 What is this software?
Pods by Podsfoundation
Pods by Podsfoundation
Pods by Podsfoundation
Pods by Podsfoundation
⚠️ Risk & Real-World Impact
Worst Case
Full server compromise allowing data theft, malware deployment, and complete site takeover.
Likely Case
Unauthorized code execution leading to data manipulation, backdoor installation, or privilege escalation.
If Mitigated
Limited impact if proper access controls and monitoring are in place.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.0.11, 2.9.19.2, 2.8.23.2, 2.7.31.2
Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Pods plugin and click 'Update Now'. 4. Verify update to version 3.0.11 or later.
🔧 Temporary Workarounds
Disable Pods plugin
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate pods
Restrict user roles
allLimit contributor and higher role assignments
🧯 If You Can't Patch
- Implement strict access controls and limit contributor role assignments
- Enable web application firewall with RCE protection rules
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Pods version. If version is 3.0.10 or earlier (except 2.7.31.2, 2.8.23.2, 2.9.19.2), you are vulnerable.
Check Version:
wp plugin list --name=pods --field=version
Verify Fix Applied:
Confirm Pods plugin version is 3.0.11, 2.9.19.2, 2.8.23.2, or 2.7.31.2 in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Unusual shortcode execution in WordPress logs
- PHP execution attempts from user accounts
- Suspicious file creation/modification
Network Indicators:
- Unexpected outbound connections from web server
- Command and control traffic patterns
SIEM Query:
source="wordpress" AND ("pods" OR "shortcode") AND ("exec" OR "system" OR "shell_exec")
🔗 References
- https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve
- https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=
- https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve