The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Metrics
Affected Vendors & Products
References
History
Tue, 06 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 06 May 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. | |
Title | LayoutBoxx <= 0.3.1 - Unauthenticated Arbitrary Shortcode Execution | |
Weaknesses | CWE-94 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-06T04:24:13.420Z
Updated: 2025-05-06T14:16:08.311Z
Reserved: 2025-03-25T21:06:58.772Z
Link: CVE-2025-2802

Updated: 2025-05-06T14:16:04.734Z

Status : Awaiting Analysis
Published: 2025-05-06T05:15:49.483
Modified: 2025-05-07T14:13:35.980
Link: CVE-2025-2802

No data.