Critical severity9.9NVD Advisory· Published Aug 21, 2024· Updated Apr 8, 2026
CVE-2024-6386
CVE-2024-6386
Description
The WPML plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.6.12 via Twig Server-Side Template Injection. This is due to missing input validation and sanitization on the render function. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- sec.stealthcopter.com/wpml-rce-via-twig-ssti/nvdExploitThird Party Advisory
- www.wordfence.com/threat-intel/vulnerabilities/id/f7fc91cc-e529-4362-8269-bf7ee0766e1envdThird Party Advisory
- wpml.orgnvdProduct
News mentions
0No linked articles in our index yet.