{"api_version":"1","generated_at":"2026-04-14T20:05:29+00:00","cve":"CVE-2023-6965","urls":{"html":"https://cve.report/CVE-2023-6965","api":"https://cve.report/api/cve/CVE-2023-6965.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-6965","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-6965"},"summary":{"title":"Pods - Custom Content Types and Fields - Missing Authorization","description":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This is due to the fact that the plugin allows the use of a file inclusion feature via shortcode. This makes it possible for authenticated attackers, with contributor access or higher, to create pods and users (with default role).","state":"PUBLISHED","assigner":"Wordfence","published_at":"2024-04-09 19:15:13","updated_at":"2026-04-08 19:19:03"},"problem_types":["CWE-862","CWE-862 CWE-862 Missing Authorization"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","data":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750","name":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","name":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-6965","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6965","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 2.7.31 semver","platforms":[]},{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 2.8 2.8.23.2 semver","platforms":[]},{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 3 3.0.10.2 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2024-03-28T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Nex Team","lang":"en"}],"nvd_cpes":[{"cve_year":"2023","cve_id":"6965","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"podsfoundation","cpe5":"pods","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2023-6965","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2024-04-15T15:33:22.526507Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-06-04T17:17:14.268Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2024-08-02T08:50:06.714Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail="}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Pods – Custom Content Types and Fields","vendor":"sc0ttkclark","versions":[{"lessThan":"2.7.31","status":"affected","version":"0","versionType":"semver"},{"lessThan":"2.8.23.2","status":"affected","version":"2.8","versionType":"semver"},{"lessThan":"3.0.10.2","status":"affected","version":"3","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Nex Team"}],"descriptions":[{"lang":"en","value":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This is due to the fact that the plugin allows the use of a file inclusion feature via shortcode. This makes it possible for authenticated attackers, with contributor access or higher, to create pods and users (with default role)."}],"metrics":[{"cvssV3_1":{"baseScore":4.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-862","description":"CWE-862 Missing Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:21:00.980Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail="}],"timeline":[{"lang":"en","time":"2024-03-28T00:00:00.000Z","value":"Disclosed"}],"title":"Pods - Custom Content Types and Fields - Missing Authorization"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2023-6965","datePublished":"2024-04-09T18:59:20.952Z","dateReserved":"2023-12-19T21:16:40.415Z","dateUpdated":"2026-04-08T17:21:00.980Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-04-09 19:15:13","lastModifiedDate":"2026-04-08 19:19:03","problem_types":["CWE-862","CWE-862 CWE-862 Missing Authorization"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.7.31.2","matchCriteriaId":"8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.8","versionEndExcluding":"2.8.23.2","matchCriteriaId":"91FDD715-74B2-4367-8C7E-D295FCE56C06"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.9","versionEndExcluding":"2.9.19.2","matchCriteriaId":"E3921A22-540B-4D73-9283-D786603B60D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.10.2","matchCriteriaId":"BD03632B-4456-4036-AE55-14914FFF63E7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2023","CveId":"6965","Ordinal":"1","Title":"Pods - Custom Content Types and Fields - Missing Authorization","CVE":"CVE-2023-6965","Year":"2023"},"notes":[{"CveYear":"2023","CveId":"6965","Ordinal":"1","NoteData":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This is due to the fact that the plugin allows the use of a file inclusion feature via shortcode. This makes it possible for authenticated attackers, with contributor access or higher, to create pods and users (with default role).","Type":"Description","Title":"Pods - Custom Content Types and Fields - Missing Authorization"}]}}}