Vulnerabilities and security researches forcode-snippets code-snippets
Direction: ascendingJun 06, 2024
Code Snippets # CVE-2023-47666
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 19, 2023
- Research Description
- Cross-Site Request Forgery (CSRF) vulnerability in Code Snippets Pro Code Snippets.This issue affects Code Snippets: from n/a through 3.5.0.
- Affected versions
-
max 3.6.0.
- Status
-
vulnerable
Code Snippets # CVE-2021-25008
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 24, 2022
- Research Description
- The Code Snippets WordPress plugin before 2.14.3 does not escape the snippets-safe-mode parameter before outputting it back in attributes, leading to a Reflected Cross-Site Scripting issue
- Affected versions
-
max 2.14.3.
- Status
-
vulnerable
Code Snippets # CVE-2020-8417
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 29, 2020
- Research Description
- The Code Snippets plugin before 2.14.0 for WordPress allows CSRF because of the lack of a Referer check on the import menu.
- Affected versions
-
max 2.14.0.
- Status
-
vulnerable
Code Snippets # CVE-2022-25617
- CVE, Research URL
- Home page URL
- Application
- Date
- May 18, 2022
- Research Description
- Reflected Cross-Site Scripting (XSS) vulnerability in Code Snippets plugin <= 2.14.3 at WordPress via &orderby vulnerable parameter.
- Affected versions
-
max 3.6.0.
- Status
-
vulnerable
Jan 09, 2026
Code Snippets # CVE-2025-13035
- CVE, Research URL
- Home page URL
- Application
- Date
- Nov 19, 2025
- Research Description
- The Code Snippets plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 3.9.1. This is due to the plugin's use of extract() on attacker-controlled shortcode attributes within the `evaluate_shortcode_from_flat_file` method, which can be used to overwrite the `$filepath` variable and subsequently passed to require_once. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server via the `[code_snippet]` shortcode using PHP filter chains granted they can trick an administrator into enabling the "Enable file-based execution" setting and creating at least one active Content snippet.
- Affected versions
-
max 3.9.2.
- Status
-
vulnerable