# Ocean Extra <= 2.4.6 - 未经身份验证的任意简码执行
## 漏洞概述
Ocean Extra插件在WordPress中存在任意短代码执行漏洞,影响所有版本至2.4.6版本。
## 影响版本
- 所有版本至2.4.6
## 漏洞细节
该漏洞是由于插件允许用户执行一个在调用 `do_shortcode` 之前未正确验证值的动作。当WooCommerce插件也被安装并激活时,这将使得未认证的攻击者能够执行任意短代码。
## 影响
未认证的攻击者可以利用此漏洞执行任意短代码,这可能会导致进一步的安全问题,如信息泄露、数据篡改等。
是否为 Web 类漏洞: 是
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | The Ocean Extra plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.4.6. This is due to the software allowing users to supply arbitrary shortcodes in the content_rech_data parameter that is then executed. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes when WooCommerce is also installed and activated. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-3472.yaml | POC详情 |
标题: Changeset 3277977 – WordPress Plugin Repository -- 🔗来源链接
标签:
标题: Ocean Extra <= 2.4.6 - Unauthenticated Arbitrary Shortcode Execution -- 🔗来源链接
标签:
标题: shortcodes.php in ocean-extra/trunk/includes/shortcodes – WordPress Plugin Repository -- 🔗来源链接
标签:
暂无评论