{"api_version":"1","generated_at":"2026-04-14T12:34:05+00:00","cve":"CVE-2023-6967","urls":{"html":"https://cve.report/CVE-2023-6967","api":"https://cve.report/api/cve/CVE-2023-6967.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-6967","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-6967"},"summary":{"title":"Pods - Custom Content Types and Fields - Authenticated (Contributor+) SQL Injection via Shortcode","description":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to SQL Injection via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with contributor level access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2024-04-09 19:15:13","updated_at":"2026-04-08 17:17:17"},"problem_types":["CWE-89","CWE-89 CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750","name":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","name":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-6967","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6967","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 2.7.31 semver","platforms":[]},{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 2.8 2.8.23.2 semver","platforms":[]},{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 3 3.0.10.2 semver","platforms":[]},{"source":"ADP","vendor":"podsfoundation","product":"pods","version":"affected 2.7.31 semver","platforms":[]},{"source":"ADP","vendor":"podsfoundation","product":"pods","version":"affected 2.8 2.8.23.2 semver","platforms":[]},{"source":"ADP","vendor":"podsfoundation","product":"pods","version":"affected 3.0 3.0.10.2 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2024-03-28T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Nex Team","lang":"en"}],"nvd_cpes":[{"cve_year":"2023","cve_id":"6967","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"podsfoundation","cpe5":"pods","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"affected":[{"cpes":["cpe:2.3:a:podsfoundation:pods:-:*:*:*:*:wordpress:*:*"],"defaultStatus":"unknown","product":"pods","vendor":"podsfoundation","versions":[{"lessThan":"2.7.31","status":"affected","version":"0","versionType":"semver"},{"lessThan":"2.8.23.2","status":"affected","version":"2.8","versionType":"semver"},{"lessThan":"3.0.10.2","status":"affected","version":"3.0","versionType":"semver"}]}],"metrics":[{"other":{"content":{"id":"CVE-2023-6967","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-07-05T19:52:43.808921Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-07-22T20:06:03.607Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2024-08-02T08:50:06.900Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=cve"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail="}],"title":"CVE Program Container"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Pods – Custom Content Types and Fields","vendor":"sc0ttkclark","versions":[{"lessThan":"2.7.31","status":"affected","version":"0","versionType":"semver"},{"lessThan":"2.8.23.2","status":"affected","version":"2.8","versionType":"semver"},{"lessThan":"3.0.10.2","status":"affected","version":"3","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Nex Team"}],"descriptions":[{"lang":"en","value":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to SQL Injection via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with contributor level access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."}],"metrics":[{"cvssV3_1":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-89","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T16:38:07.331Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/1aa7d0c2-27ec-47ad-8baa-c281c273078e?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail="}],"timeline":[{"lang":"en","time":"2024-03-28T00:00:00.000Z","value":"Disclosed"}],"title":"Pods - Custom Content Types and Fields - Authenticated (Contributor+) SQL Injection via Shortcode"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2023-6967","datePublished":"2024-04-09T18:58:35.411Z","dateReserved":"2023-12-19T21:28:04.409Z","dateUpdated":"2026-04-08T16:38:07.331Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-04-09 19:15:13","lastModifiedDate":"2026-04-08 17:17:17","problem_types":["CWE-89","CWE-89 CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.7.31.2","matchCriteriaId":"8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.8","versionEndExcluding":"2.8.23.2","matchCriteriaId":"91FDD715-74B2-4367-8C7E-D295FCE56C06"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.9","versionEndExcluding":"2.9.19.2","matchCriteriaId":"E3921A22-540B-4D73-9283-D786603B60D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.10.2","matchCriteriaId":"BD03632B-4456-4036-AE55-14914FFF63E7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2023","CveId":"6967","Ordinal":"1","Title":"Pods - Custom Content Types and Fields - Authenticated (Contribu","CVE":"CVE-2023-6967","Year":"2023"},"notes":[{"CveYear":"2023","CveId":"6967","Ordinal":"1","NoteData":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to SQL Injection via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2) due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with contributor level access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.","Type":"Description","Title":"Pods - Custom Content Types and Fields - Authenticated (Contribu"}]}}}