VYPR
High severity7.3NVD Advisory· Published Oct 15, 2024· Updated Apr 15, 2026

CVE-2024-9837

CVE-2024-9837

Description

The The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Unauthenticated arbitrary shortcode execution in the AADMY plugin for WordPress up to version 2.0.1 allows attackers to achieve Remote Code Execution.

Vulnerability

Overview The AADMY – Add Auto Date Month Year Into Posts plugin for WordPress, all versions up to and including 2.0.1, contains a vulnerability that permits unauthenticated attackers to execute arbitrary WordPress shortcodes. The plugin fails to validate a value passed into the do_shortcode function during execution of a specific action, leading to arbitrary shortcode execution [1].

Exploitation

Method An attacker can exploit this by sending a crafted request to the vulnerable action without requiring any authentication. The lack of input validation makes it trivial to inject arbitrary shortcodes, which can then invoke sensitive WordPress functions or execute arbitrary code. The plugin's own documentation lists numerous shortcodes (e.g., [cy], [today], [offset]) that are intended for dynamic date display, but the vulnerability allows any shortcode registered in WordPress to be run [1].

Potential

Impact Successful exploitation allows an attacker to execute arbitrary shortcodes, which in a standard WordPress installation can include the [file] shortcode or others that execute system commands, read files, or modify database entries. This can lead to Remote Code Execution (RCE), full site compromise, and data exfiltration. The CVSS v3 base score of 7.3 (High) reflects the low complexity and lack of authentication requirements [1].

Mitigation

At the time of publication, there is no patched version of the plugin. Users are advised to disable the plugin until the vendor releases an update that corrects the input validation flaw. The vulnerability is publicly documented on the Wordfence Intelligence platform and may be added to the CISA Known Exploited Vulnerabilities (KEV) catalog if active exploitation is observed [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.