Cyber Posture

CVE-2024-10633

High

Published: 26 January 2025

Published
26 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0034 56.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-10633 is a high-severity Eval Injection (CWE-95) vulnerability in Ays Pro (inferred from references). Its CVSS base score is 7.3 (High).

Operationally, ranked in the top 43.2% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of inputs before processing, addressing the core flaw of insufficient validation prior to do_shortcode execution.

preventrecover

Mandates timely remediation of flaws through patching, directly mitigating exploitation by updating vulnerable Quiz Maker plugin versions.

detect

Enables vulnerability scanning to identify and prioritize the specific shortcode execution flaw in deployed plugins.

NVD Description

The Quiz Maker Business, Developer, and Agency plugins for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.8.0 (Business), up to, and including, 21.8.0 (Developer), and up to, and including, 31.8.0 (Agency). This is…

more

due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

Deeper analysisAI

CVE-2024-10633 is an arbitrary shortcode execution vulnerability in the Quiz Maker Business, Developer, and Agency plugins for WordPress. It affects all versions up to and including 8.8.0 for Business, 21.8.0 for Developer, and 31.8.0 for Agency. The issue arises because the plugins allow execution of an action that fails to properly validate a value before calling do_shortcode, enabling unauthenticated attackers to run arbitrary shortcodes. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L) and is associated with CWE-95.

Unauthenticated attackers can exploit this vulnerability remotely with low attack complexity and no user interaction required. By targeting the insufficiently validated input, they can execute arbitrary shortcodes on affected WordPress sites, leading to low impacts on confidentiality, integrity, and availability as per the CVSS metrics.

Mitigation details are available in advisories from Wordfence and the plugin developer's changelog and product page at ays-pro.com, which reference updates addressing the shortcode validation flaw. Security practitioners should urge site owners to update the plugins beyond the listed vulnerable versions.

Details

CWE(s)

Affected Products

Ays Pro
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-68271Shared CWE-95
CVE-2026-4001Shared CWE-95
CVE-2026-23885Shared CWE-95
CVE-2025-0868Shared CWE-95
CVE-2026-35002Shared CWE-95
CVE-2026-29091Shared CWE-95
CVE-2025-40943Shared CWE-95
CVE-2026-1470Shared CWE-95
CVE-2026-33618Shared CWE-95
CVE-2025-27603Shared CWE-95

References