Skip to main content

CVE-2024-13812: CWE-94 Improper Control of Generation of Code ('Code Injection') in Anps Anps Theme plugin

Medium
VulnerabilityCVE-2024-13812cvecve-2024-13812cwe-94
Published: Sat Apr 26 2025 (04/26/2025, 08:23:19 UTC)
Source: CVE
Vendor/Project: Anps
Product: Anps Theme plugin

Description

The The Anps Theme plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.1.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI-Powered Analysis

AILast updated: 06/24/2025, 19:20:58 UTC

Technical Analysis

CVE-2024-13812 is a medium-severity vulnerability affecting the Anps Theme plugin for WordPress, present in all versions up to and including 1.1.1. The vulnerability stems from improper control over the generation of code, specifically classified under CWE-94 (Improper Control of Generation of Code, commonly known as code injection). The plugin allows unauthenticated attackers to execute arbitrary shortcodes via the do_shortcode function without proper validation of input values. Shortcodes in WordPress are macros that can execute PHP code or trigger plugin/theme functionality. By exploiting this flaw, an attacker can inject and execute arbitrary shortcodes, potentially leading to unauthorized actions such as data leakage, modification of content, or other malicious behavior depending on the shortcode capabilities. The vulnerability does not require authentication or user interaction, and the attack vector is network-based (remote). The CVSS 3.1 base score is 6.5, reflecting a medium severity with low complexity of attack, no privileges required, and no user interaction needed. The impact primarily affects confidentiality and integrity, with no direct impact on availability reported. Although no known exploits are currently observed in the wild, the ease of exploitation and unauthenticated access make this a significant risk for websites using the vulnerable plugin. No official patches or updates have been linked yet, indicating that mitigation may require manual intervention or disabling the plugin until a fix is released.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on WordPress websites using the Anps Theme plugin. Exploitation could lead to unauthorized disclosure of sensitive information, defacement of websites, or injection of malicious content that could damage brand reputation and customer trust. E-commerce sites, government portals, and corporate websites are particularly at risk, as attackers could leverage shortcode execution to escalate attacks, implant malware, or pivot into internal networks. Given the unauthenticated nature of the vulnerability, attackers can scan and exploit vulnerable sites en masse, increasing the likelihood of widespread compromise. This could disrupt business operations, lead to regulatory non-compliance under GDPR due to data breaches, and incur financial losses from remediation and reputational damage. The medium severity score suggests that while the vulnerability is serious, it may not directly cause system outages or full system compromise without additional chained exploits. However, the ease of exploitation and potential for arbitrary code execution via shortcodes make it a critical concern for web administrators.

Mitigation Recommendations

Immediately audit all WordPress installations to identify the presence of the Anps Theme plugin, especially versions up to 1.1.1. Disable or remove the Anps Theme plugin from all affected sites until an official patch or update is released by the vendor. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode execution patterns or unusual POST/GET requests targeting shortcode parameters. Restrict access to WordPress administrative and plugin endpoints using IP whitelisting or VPN access to reduce exposure to unauthenticated attacks. Enable and monitor detailed logging of shortcode executions and web requests to detect potential exploitation attempts early. Educate site administrators on the risks of installing unverified plugins and encourage the use of plugins from reputable sources with active maintenance. Regularly update WordPress core, themes, and plugins to the latest versions once patches addressing this vulnerability are released. Consider implementing Content Security Policy (CSP) headers to limit the execution of unauthorized scripts that could be injected via shortcode exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-30T20:25:34.428Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef788

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 7:20:58 PM

Last updated: 7/31/2025, 9:34:15 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats