The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-57532 | The OpenHook plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 4.3.0 via the 'php' shortcode. This allows authenticated attackers with subscriber-level permissions or above, to execute code on the server. This requires the [php] shortcode setting to be enabled on the vulnerable site. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | OpenHook <= 4.3.0 - Authenticated (Subscriber+) Remote Code Execution via Shortcode | |
| Weaknesses | CWE-94 |
Thu, 26 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:46:24.958Z
Reserved: 2023-09-26T13:05:01.712Z
Link: CVE-2023-5201
Updated: 2024-08-02T07:52:07.974Z
Status : Modified
Published: 2023-09-30T03:15:09.547
Modified: 2026-04-08T18:18:24.400
Link: CVE-2023-5201
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD