🔐 CVE Alert

CVE-2024-3105

CRITICAL 9.9

Woody code snippets – Insert Header Footer Code, AdSense Ads <= 2.5.0 -Authenticated (Contributor+) Remote Code Execution

CVSS Score
9.9
EPSS Score
0.0%
EPSS Percentile
0th

The Woody code snippets – Insert Header Footer Code, AdSense Ads plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.5.0 via the 'insert_php' shortcode. This is due to the plugin not restricting the usage of the functionality to high level authorized users. This makes it possible for authenticated attackers, with contributor-level access and above, to execute code on the server.

CWE CWE-94
Vendor themeisle
Product woody code snippets – insert php, css, js, and header/footer scripts
Published Jun 15, 2024
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for themeisle woody code snippets – insert php, css, js, and header/footer scripts

Be the first to know when new critical vulnerabilities affecting themeisle woody code snippets – insert php, css, js, and header/footer scripts are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

themeisle / Woody Code Snippets – Insert PHP, CSS, JS, and Header/Footer Scripts
0 ≤ 2.5.0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/134ad095-b0a0-4f0f-832d-3e558d4a250a?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/insert-php/trunk/includes/class.plugin.php#L166 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/insert-php/trunk/includes/shortcodes/shortcode-insert-php.php plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3102522%40insert-php&new=3102522%40insert-php&sfp_email=&sfph_mail=

Credits

Craig Smith