{"api_version":"1","generated_at":"2026-04-14T20:06:43+00:00","cve":"CVE-2023-6999","urls":{"html":"https://cve.report/CVE-2023-6999","api":"https://cve.report/api/cve/CVE-2023-6999.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-6999","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-6999"},"summary":{"title":"Pods - Custom Content Types and Fields - Authenticated (Contributor+) Remote Code Execution","description":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server.","state":"PUBLISHED","assigner":"Wordfence","published_at":"2024-04-09 19:15:13","updated_at":"2026-04-08 19:19:05"},"problem_types":["CWE-77","NVD-CWE-noinfo","CWE-77 CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"],"metrics":[{"version":"3.1","source":"security@wordfence.com","type":"Secondary","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"8.8","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","data":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750","name":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","name":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve","name":"https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-6999","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6999","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 2.7.31 semver","platforms":[]},{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 2.8 2.8.23.2 semver","platforms":[]},{"source":"CNA","vendor":"sc0ttkclark","product":"Pods – Custom Content Types and Fields","version":"affected 3 3.0.10.2 semver","platforms":[]},{"source":"ADP","vendor":"podsfoundation","product":"pods","version":"affected 2.7.31 semver","platforms":[]},{"source":"ADP","vendor":"podsfoundation","product":"pods","version":"affected 2.8 2.8.23.2 semver","platforms":[]},{"source":"ADP","vendor":"podsfoundation","product":"pods","version":"affected 3.0 3.0.10.2 semver","platforms":[]}],"timeline":[{"source":"CNA","time":"2024-03-28T00:00:00.000Z","lang":"en","value":"Disclosed"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Nex Team","lang":"en"}],"nvd_cpes":[{"cve_year":"2023","cve_id":"6999","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"podsfoundation","cpe5":"pods","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"wordpress","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-02T08:50:06.858Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_transferred"],"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750"},{"tags":["x_transferred"],"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail="}],"title":"CVE Program Container"},{"affected":[{"cpes":["cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*"],"defaultStatus":"unaffected","product":"pods","vendor":"podsfoundation","versions":[{"lessThan":"2.7.31","status":"affected","version":"0","versionType":"semver"}]},{"cpes":["cpe:2.3:a:podsfoundation:pods:2.8:*:*:*:*:wordpress:*:*"],"defaultStatus":"unaffected","product":"pods","vendor":"podsfoundation","versions":[{"lessThan":"2.8.23.2","status":"affected","version":"2.8","versionType":"semver"}]},{"cpes":["cpe:2.3:a:podsfoundation:pods:3.0:*:*:*:*:wordpress:*:*"],"defaultStatus":"unaffected","product":"pods","vendor":"podsfoundation","versions":[{"lessThan":"3.0.10.2","status":"affected","version":"3.0","versionType":"semver"}]}],"metrics":[{"other":{"content":{"id":"CVE-2023-6999","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2024-04-10T19:09:05.006810Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2024-08-08T19:46:34.642Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","product":"Pods – Custom Content Types and Fields","vendor":"sc0ttkclark","versions":[{"lessThan":"2.7.31","status":"affected","version":"0","versionType":"semver"},{"lessThan":"2.8.23.2","status":"affected","version":"2.8","versionType":"semver"},{"lessThan":"3.0.10.2","status":"affected","version":"3","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Nex Team"}],"descriptions":[{"lang":"en","value":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server."}],"metrics":[{"cvssV3_1":{"baseScore":8.8,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-77","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-08T17:27:00.847Z","orgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","shortName":"Wordfence"},"references":[{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve"},{"url":"https://plugins.trac.wordpress.org/browser/pods/trunk/classes/PodsView.php#L750"},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail="}],"timeline":[{"lang":"en","time":"2024-03-28T00:00:00.000Z","value":"Disclosed"}],"title":"Pods - Custom Content Types and Fields - Authenticated (Contributor+) Remote Code Execution"}},"cveMetadata":{"assignerOrgId":"b15e7b5b-3da4-40ae-a43c-f7aa60e62599","assignerShortName":"Wordfence","cveId":"CVE-2023-6999","datePublished":"2024-04-09T18:59:26.244Z","dateReserved":"2023-12-20T14:35:26.617Z","dateUpdated":"2026-04-08T17:27:00.847Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2024-04-09 19:15:13","lastModifiedDate":"2026-04-08 19:19:05","problem_types":["CWE-77","NVD-CWE-noinfo","CWE-77 CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.7.31.2","matchCriteriaId":"8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.8","versionEndExcluding":"2.8.23.2","matchCriteriaId":"91FDD715-74B2-4367-8C7E-D295FCE56C06"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.9","versionEndExcluding":"2.9.19.2","matchCriteriaId":"E3921A22-540B-4D73-9283-D786603B60D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.10.2","matchCriteriaId":"BD03632B-4456-4036-AE55-14914FFF63E7"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2023","CveId":"6999","Ordinal":"1","Title":"Pods - Custom Content Types and Fields - Authenticated (Contribu","CVE":"CVE-2023-6999","Year":"2023"},"notes":[{"CveYear":"2023","CveId":"6999","Ordinal":"1","NoteData":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server.","Type":"Description","Title":"Pods - Custom Content Types and Fields - Authenticated (Contribu"}]}}}