Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-4037: CWE-94 Improper Control of Generation of Code ('Code Injection') in opajaap WP Photo Album Plus

0
Medium
VulnerabilityCVE-2024-4037cvecve-2024-4037cwe-94
Published: Fri May 24 2024 (05/24/2024, 08:30:25 UTC)
Source: CVE Database V5
Vendor/Project: opajaap
Product: WP Photo Album Plus

Description

CVE-2024-4037 is a medium-severity vulnerability in the WP Photo Album Plus WordPress plugin, affecting all versions up to 8. 7. 02. 003. It allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before calling do_shortcode. This code injection vulnerability (CWE-94) can lead to limited confidentiality and integrity impacts without requiring user interaction or authentication. While no known exploits are currently active in the wild, the vulnerability poses a risk to websites using this plugin. Organizations running vulnerable versions should prioritize patching or applying mitigations to prevent potential exploitation. The vulnerability has a CVSS score of 6. 5, reflecting its moderate risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 00:26:15 UTC

Technical Analysis

CVE-2024-4037 is a code injection vulnerability classified under CWE-94 found in the WP Photo Album Plus plugin for WordPress. The flaw exists because the plugin allows unauthenticated users to trigger an action that executes arbitrary shortcodes without proper validation. Specifically, the plugin calls WordPress's do_shortcode function on user-supplied input without sanitization or verification, enabling attackers to inject and execute arbitrary shortcode commands. Since shortcodes can invoke PHP functions or embed dynamic content, this can lead to unauthorized actions such as data leakage or manipulation within the WordPress environment. The vulnerability affects all versions up to and including 8.7.02.003. Exploitation requires no authentication or user interaction, increasing the attack surface. However, the impact is limited to confidentiality and integrity, with no direct availability impact reported. No public exploits have been observed yet, but the vulnerability is publicly disclosed and assigned a CVSS v3.1 score of 6.5, indicating a medium severity level. The issue stems from improper input validation and insufficient control over code generation, a common risk in plugins that handle dynamic content execution.

Potential Impact

The vulnerability allows unauthenticated attackers to execute arbitrary shortcodes, potentially leading to unauthorized disclosure or modification of data within the affected WordPress site. While it does not directly impact availability, the integrity and confidentiality of site content and possibly user data can be compromised. Attackers could leverage this to inject malicious content, manipulate displayed data, or perform unauthorized actions permitted by shortcode capabilities. This can undermine user trust, damage brand reputation, and lead to further exploitation if combined with other vulnerabilities. Given WordPress's widespread use, especially among small to medium businesses and bloggers, the vulnerability could be exploited to target a broad range of websites globally. The lack of authentication requirement and ease of exploitation increase the risk of automated attacks and mass scanning campaigns once exploit code becomes available.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify if WP Photo Album Plus is installed and determine the version in use. Until an official patch is released, administrators should consider disabling or removing the plugin to eliminate the attack vector. If removal is not feasible, restricting access to the vulnerable shortcode execution endpoints via web application firewalls (WAFs) or server-level access controls can reduce exposure. Implementing strict input validation and sanitization on any user-supplied data passed to do_shortcode is critical. Monitoring web server logs and WordPress activity logs for unusual shortcode execution or unexpected requests can help detect exploitation attempts early. Administrators should subscribe to vendor and security mailing lists for updates and apply patches promptly once available. Additionally, employing security plugins that limit shortcode execution or sandbox plugin behavior can provide an extra layer of defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-04-22T18:28:05.517Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b80b7ef31ef0b556037

Added to database: 2/25/2026, 9:37:04 PM

Last enriched: 2/26/2026, 12:26:15 AM

Last updated: 2/26/2026, 11:30:45 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats