{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T18:45:53.449","vulnerabilities":[{"cve":{"id":"CVE-2023-6965","sourceIdentifier":"security@wordfence.com","published":"2024-04-09T19:15:13.273","lastModified":"2026-04-08T19:19:03.297","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This is due to the fact that the plugin allows the use of a file inclusion feature via shortcode. This makes it possible for authenticated attackers, with contributor access or higher, to create pods and users (with default role)."},{"lang":"es","value":"El complemento Pods – Custom Content Types and Fields para WordPress  es vulnerable a la falta de autorización en todas las versiones hasta la 3.0.10 incluida (con la excepción de 2.7.31.2, 2.8.23.2, 2.9.19.2). Esto se debe al hecho de que el complemento permite el uso de una función de inclusión de archivos mediante un código corto. Esto hace posible que atacantes autenticados, con acceso de colaborador o superior, creen pods y usuarios (con rol predeterminado)."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:N\/I:L\/A:N","baseScore":4.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.7.31.2","matchCriteriaId":"8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.8","versionEndExcluding":"2.8.23.2","matchCriteriaId":"91FDD715-74B2-4367-8C7E-D295FCE56C06"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.9","versionEndExcluding":"2.9.19.2","matchCriteriaId":"E3921A22-540B-4D73-9283-D786603B60D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.10.2","matchCriteriaId":"BD03632B-4456-4036-AE55-14914FFF63E7"}]}]}],"references":[{"url":"https:\/\/plugins.trac.wordpress.org\/browser\/pods\/trunk\/classes\/PodsView.php#L750","source":"security@wordfence.com","tags":["Product"]},{"url":"https:\/\/plugins.trac.wordpress.org\/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","source":"security@wordfence.com","tags":["Product"]},{"url":"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/id\/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https:\/\/plugins.trac.wordpress.org\/browser\/pods\/trunk\/classes\/PodsView.php#L750","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https:\/\/plugins.trac.wordpress.org\/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/id\/c5d330cd-ad1f-451e-bf41-39cfeb296cf0?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}