CVE-2024-8623

7.3 HIGH

📋 TL;DR

The MDTF WordPress plugin allows unauthenticated attackers to execute arbitrary shortcodes due to improper input validation. This affects all WordPress sites using MDTF plugin versions up to 1.3.3.3, potentially enabling content injection, privilege escalation, or remote code execution.

💻 Affected Systems

Products:
  • MDTF – Meta Data and Taxonomies Filter WordPress Plugin
Versions: All versions up to and including 1.3.3.3
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could execute arbitrary PHP code via malicious shortcodes, leading to complete site compromise, data theft, or server takeover.

🟠

Likely Case

Attackers inject malicious content, redirect users to phishing sites, or escalate privileges by executing administrative shortcodes.

🟢

If Mitigated

With proper input validation and security plugins, impact is limited to content manipulation without code execution.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

No public PoC yet, but the vulnerability is simple to exploit and unauthenticated, making weaponization likely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.3.4 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3150646%40wp-meta-data-filter-and-taxonomy-filter&new=3150646%40wp-meta-data-filter-and-taxonomy-filter&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'MDTF – Meta Data and Taxonomies Filter'. 4. Click 'Update Now' if available, or manually update to version 1.3.3.4+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable MDTF Plugin

all

Temporarily disable the vulnerable plugin until patching is possible.

wp plugin deactivate wp-meta-data-filter-and-taxonomy-filter

Restrict Access with WAF

all

Block requests to vulnerable endpoints using web application firewall rules.

🧯 If You Can't Patch

  • Immediately disable the MDTF plugin via WordPress admin or command line.
  • Implement strict input validation at application level to filter shortcode execution attempts.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for MDTF version. If version is 1.3.3.3 or lower, you are vulnerable.

Check Version:

wp plugin get wp-meta-data-filter-and-taxonomy-filter --field=version

Verify Fix Applied:

After update, confirm MDTF plugin version is 1.3.3.4 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress endpoints with shortcode parameters
  • Unexpected execution of do_shortcode() in debug logs

Network Indicators:

  • HTTP requests containing [shortcode] patterns to WordPress sites
  • Traffic spikes to plugin-specific endpoints

SIEM Query:

source="wordpress.log" AND ("do_shortcode" OR "[shortcode]") AND status=200

🔗 References

📤 Share & Export