CVE-2024-9846

7.3 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the Enable Shortcodes plugin. Attackers can potentially run malicious code, inject content, or exploit other plugins via shortcode execution. All WordPress sites using this plugin version 1.0.0 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Enable Shortcodes inside Widgets,Comments and Experts plugin
Versions: All versions up to and including 1.0.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, or malware injection if vulnerable shortcodes exist in other plugins/themes.

🟠

Likely Case

Content injection, privilege escalation through other vulnerable shortcodes, or site defacement.

🟢

If Mitigated

Limited impact if no dangerous shortcodes exist and proper input validation is enforced elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request with crafted shortcode parameter can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.1

Vendor Advisory: https://wordpress.org/plugins/enable-shortcodes-inside-widgetscomments-and-experts/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Enable Shortcodes inside Widgets,Comments and Experts'. 4. Click 'Update Now' if available, or delete and reinstall latest version. 5. Verify plugin version is 1.0.1 or higher.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched.

wp plugin deactivate enable-shortcodes-inside-widgetscomments-and-experts

Remove Plugin Files

linux

Completely remove the plugin files from the server.

rm -rf /path/to/wp-content/plugins/enable-shortcodes-inside-widgetscomments-and-experts/

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block requests containing suspicious shortcode patterns.
  • Restrict access to affected WordPress endpoints using IP whitelisting or authentication requirements.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Enable Shortcodes inside Widgets,Comments and Experts' version 1.0.0 or lower.

Check Version:

wp plugin get enable-shortcodes-inside-widgetscomments-and-experts --field=version

Verify Fix Applied:

Confirm plugin version is 1.0.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress endpoints with shortcode parameters
  • Multiple failed shortcode execution attempts in WordPress debug logs

Network Indicators:

  • HTTP requests containing [shortcode] patterns to WordPress admin-ajax.php or similar endpoints

SIEM Query:

source="wordpress.log" AND "do_shortcode" AND ("unauthenticated" OR "malicious")

🔗 References

📤 Share & Export