The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Metrics
Affected Vendors & Products
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 06 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 May 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | |
| Title | LayoutBoxx <= 0.3.1 - Unauthenticated Arbitrary Shortcode Execution | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-06T04:24:13.420Z
Updated: 2025-05-06T14:16:08.311Z
Reserved: 2025-03-25T21:06:58.772Z
Link: CVE-2025-2802
Updated: 2025-05-06T14:16:04.734Z
Status : Awaiting Analysis
Published: 2025-05-06T05:15:49.483
Modified: 2025-05-07T14:13:35.980
Link: CVE-2025-2802
No data.