VYPR
Medium severity6.5NVD Advisory· Published Apr 26, 2025· Updated Apr 15, 2026

CVE-2024-13812

CVE-2024-13812

Description

The The Anps Theme plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.1.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Anps Theme plugin for WordPress (≤1.1.1) allows unauthenticated attackers to execute arbitrary shortcodes due to improper validation before do_shortcode.

Vulnerability

Overview The Anps Theme plugin for WordPress, versions up to and including 1.1.1, contains a vulnerability that allows arbitrary shortcode execution. The issue stems from the plugin's failure to properly validate a value before passing it to the do_shortcode function [1]. This lack of validation means that any user-supplied input can be processed as a shortcode without proper authorization checks.

Exploitation

Details An unauthenticated attacker can exploit this vulnerability by sending a crafted request to the vulnerable endpoint. No authentication or special privileges are required, making the attack surface broad for any WordPress site running the affected plugin. The attacker simply needs to trigger the action that invokes do_shortcode with the unvalidated value.

Impact

Successful exploitation allows the attacker to execute arbitrary shortcodes within the WordPress context. Depending on the available shortcodes, this could lead to reading sensitive data, modifying site content, or potentially executing code if dangerous shortcodes are present. The exact impact varies based on the installed plugins and themes that register shortcodes.

Mitigation

As of the publication date, no official patch has been confirmed. Users are advised to disable or remove the Anps Theme plugin until a security update is released. Alternatively, implementing a Web Application Firewall (WAF) rule to block malicious shortcode injection attempts may provide temporary protection.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.