Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57532 | The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenHook <= 4.3.0 - Authenticated (Subscriber+) Remote Code Execution via Shortcode | |
| Weaknesses | CWE-94 |
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:46:24.958Z
Reserved: 2023-09-26T13:05:01.712Z
Link: CVE-2023-5201
Updated: 2024-08-02T07:52:07.974Z
Status : Modified
Published: 2023-09-30T03:15:09.547
Modified: 2026-04-08T18:18:24.400
Link: CVE-2023-5201
No data.
OpenCVE Enrichment
No data.
EUVD