Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sun, 21 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 19 Dec 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Fri, 19 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 19 Dec 2025 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Ocean Modal Window WordPress plugin before 2.3.3 is vulnerable to Remote Code Execution via the modal display logic. These modals can be displayed under user-controlled conditions that Editors and Administrators can set (edit_pages capability). The conditions are then executed as part of an eval statement executed on every site page. This leads to remote code execution. | |
| Title | Ocean Modal Window < 2.3.3 - Editor+ Remote Code Execution via Modal Conditions | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-12-19T18:33:30.621Z
Reserved: 2025-11-17T14:26:04.115Z
Link: CVE-2025-13307
Updated: 2025-12-19T15:42:30.952Z
Status : Deferred
Published: 2025-12-19T06:15:50.837
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-13307
No data.
OpenCVE Enrichment
Updated: 2025-12-21T21:14:50Z
No weakness.