🔐 CVE Alert

CVE-2023-4893

MEDIUM 6.4

Crayon Syntax Highlighter <= 2.8.4 - Authenticated (Contributor+) Server Side Request Forgery

CVSS Score
6.4
EPSS Score
0.0%
EPSS Percentile
0th

The Crayon Syntax Highlighter plugin for WordPress is vulnerable to Server Side Request Forgery via the 'crayon' shortcode in versions up to, and including, 2.8.4. This can allow authenticated attackers with contributor-level permissions or above to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

CWE CWE-918
Vendor akarmenia
Product crayon syntax highlighter
Published Sep 12, 2023
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for akarmenia crayon syntax highlighter

Be the first to know when new medium vulnerabilities affecting akarmenia crayon syntax highlighter are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

akarmenia / Crayon Syntax Highlighter
0 ≤ 2.8.4

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/527f75f1-6361-4e16-8ae4-d38ca4589811?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/crayon-syntax-highlighter/trunk/crayon_highlighter.class.php#L83

Credits

István Márton