Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-58124 | The Ads by datafeedr.com plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.3 via the 'dfads_ajax_load_ads' function. This allows unauthenticated attackers to execute code on the server. The parameters of the callable function are limited, they cannot be specified arbitrarily. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Ads by datafeedr.com <= 1.1.3 - Unauthenticated (Limited) Remote Code Execution | |
| Weaknesses | CWE-94 | |
| References |
|
Wed, 05 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:53:14.444Z
Reserved: 2023-10-30T00:58:44.287Z
Link: CVE-2023-5843
Updated: 2024-08-02T08:14:24.310Z
Status : Modified
Published: 2023-10-30T14:15:10.253
Modified: 2026-04-08T18:18:34.290
Link: CVE-2023-5843
No data.
OpenCVE Enrichment
No data.
EUVD