CVE-2013-2009
WordPress vulnerability analysis and mitigation

Overview

WordPress WP Super Cache Plugin version 1.2 contains a remote PHP code execution vulnerability that was discovered in early 2013. The vulnerability allows remote attackers to execute arbitrary PHP code through specially crafted comments containing mfunc, mclude and dynamic-cached-content tags (OSS Security Mail).

Technical details

The vulnerability exists due to insufficient filtering of user comments that contain special tags like mfunc, mclude and dynamic-cached-content. These tags were processed and executed by the plugin, allowing attackers to inject and execute arbitrary PHP code through comments. The issue was fixed in version 1.3 by adding filters to remove these tags from comments using the functions preprocess_comment, comment_text, comment_excerpt, and comment_text_rss (OSS Security Mail).

Impact

Successful exploitation of this vulnerability allows remote attackers to execute arbitrary PHP code on the affected system, potentially leading to complete compromise of the WordPress installation (OSS Security Mail).

Mitigation and workarounds

The vulnerability was fixed in WP Super Cache version 1.3. Users should upgrade to version 1.3 or later immediately. The fix involves removing support for mfunc, mclude and dynamic-cached-content tags from comments through the implementation of multiple comment filters (OSS Security Mail).

Community reactions

The security community expressed concern about the WordPress plugin ecosystem's security practices, particularly regarding proper vulnerability disclosure and CVE assignment processes. Kurt Seifried from Red Hat's Security Response Team highlighted the need for better security handling within the WordPress community (OSS Security Mail).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23550CRITICAL10
  • modular-connector
NoYesJan 14, 2026
CVE-2025-12166HIGH7.5
  • simply-schedule-appointments
NoYesJan 14, 2026
CVE-2026-0813MEDIUM4.4
  • short-link
NoNoJan 14, 2026
CVE-2026-0812MEDIUM4.4
  • linkedin-sc
NoNoJan 14, 2026
CVE-2026-0741MEDIUM4.4
  • electric-studio-download-counter
NoNoJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management