{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T21:20:32.685","vulnerabilities":[{"cve":{"id":"CVE-2023-6999","sourceIdentifier":"security@wordfence.com","published":"2024-04-09T19:15:13.820","lastModified":"2026-04-08T19:19:05.057","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Pods – Custom Content Types and Fields plugin for WordPress is vulnerable to Remote Code Exxecution via shortcode in all versions up to, and including, 3.0.10 (with the exception of 2.7.31.2, 2.8.23.2, 2.9.19.2). This makes it possible for authenticated attackers, with contributor level access or higher, to execute code on the server."},{"lang":"es","value":"El complemento Pods – Custom Content Types and Fields para WordPress es vulnerable a la ejecución remota de código mediante código corto en todas las versiones hasta la 3.0.10 incluida (con la excepción de 2.7.31.2, 2.8.23.2, 2.9.19.2). Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador o superior, ejecuten código en el servidor."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:L\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-77"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"2.7.31.2","matchCriteriaId":"8C5AB1DD-D7B3-40E7-A814-F7AADFFC6450"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.8","versionEndExcluding":"2.8.23.2","matchCriteriaId":"91FDD715-74B2-4367-8C7E-D295FCE56C06"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"2.9","versionEndExcluding":"2.9.19.2","matchCriteriaId":"E3921A22-540B-4D73-9283-D786603B60D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.10.2","matchCriteriaId":"BD03632B-4456-4036-AE55-14914FFF63E7"}]}]}],"references":[{"url":"https:\/\/plugins.trac.wordpress.org\/browser\/pods\/trunk\/classes\/PodsView.php#L750","source":"security@wordfence.com","tags":["Product"]},{"url":"https:\/\/plugins.trac.wordpress.org\/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","source":"security@wordfence.com","tags":["Product"]},{"url":"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/id\/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https:\/\/plugins.trac.wordpress.org\/browser\/pods\/trunk\/classes\/PodsView.php#L750","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https:\/\/plugins.trac.wordpress.org\/changeset?sfp_email=&sfph_mail=&reponame=&new=3039486%40pods%2Ftrunk&old=3039467%40pods%2Ftrunk&sfp_email=&sfph_mail=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https:\/\/www.wordfence.com\/threat-intel\/vulnerabilities\/id\/d9108d5f-7b8b-478d-ba9d-f895bdb7dbf2?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}