{"id":20730,"date":"2025-10-29T11:55:50","date_gmt":"2025-10-29T11:55:50","guid":{"rendered":"https:\/\/cloudkul.com\/blog\/?p=20730"},"modified":"2025-10-29T11:59:15","modified_gmt":"2025-10-29T11:59:15","slug":"shortcode-injection-wordpress-popular-posts-plugin","status":"publish","type":"post","link":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/","title":{"rendered":"Warning: Critical Flaw in WordPress Popular Posts Plugin"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"907\" height=\"450\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/image.png\" alt=\"image\" class=\"wp-image-20732\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>A <strong>high-severity vulnerability<\/strong> has been discovered in the <strong>WordPress Popular Posts plugin<\/strong>, which is currently active on <strong>over 100,000 websites<\/strong>. This flaw allows attackers to <strong>inject arbitrary shortcodes<\/strong> into WordPress sites <strong>without needing user accounts<\/strong>, posing a serious security threat.<\/p>\n\n\n\n<p>The <strong>WordPress Popular Posts plugin<\/strong> is commonly used to <strong>display the most popular articles<\/strong> on a website. It includes <strong>caching features for better performance<\/strong> and an <strong>admin dashboard<\/strong> for tracking post popularity and engagement.<\/p>\n\n\n\n<p>However, this newly discovered <strong>arbitrary shortcode injection vulnerability<\/strong> exposes websites to potential exploitation. Attackers can abuse the plugin to <strong>run unauthorized shortcodes<\/strong> or <strong>manipulate site content<\/strong>, leading to <strong>security breaches<\/strong> or even <strong>malware injection<\/strong>.<\/p>\n\n\n\n<p>Website owners using this plugin are strongly advised to <strong>update to the latest patched version immediately<\/strong> or <strong>temporarily disable the plugin<\/strong> until a fix is confirmed. Taking prompt action will help ensure your <strong>WordPress website remains secure and protected<\/strong> from potential attacks.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>WordPress Popular Posts Plugin Overview<\/strong><\/h2>\n\n\n\n<p>The <strong>WordPress Popular Posts plugin<\/strong> is a highly versatile and powerful tool that allows website owners to <strong>display their most-viewed or most-discussed posts<\/strong> dynamically. It automatically <strong>tracks visitor interactions<\/strong> and ranks posts by popularity using <strong>custom algorithms<\/strong>, helping you highlight trending content and boost engagement.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Features of WordPress Popular Posts Plugin<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Multiple Widgets &amp; Shortcodes:<\/strong> Easily embed popular posts anywhere on your site using widgets or shortcodes.<\/li>\n\n\n\n<li><strong>Advanced Filtering:<\/strong> Customize your display by <strong>category, timeframe, or post type<\/strong> for better audience targeting.<\/li>\n\n\n\n<li><strong>Built-in Caching:<\/strong> Improves website performance and ensures fast content delivery.<\/li>\n\n\n\n<li><strong>Developer-Friendly Hooks:<\/strong> Offers extendable hooks and filters for <strong>advanced customization<\/strong>.<\/li>\n\n\n\n<li><strong>Real-Time Analytics:<\/strong> Gain valuable <strong>visitor insights<\/strong> through live tracking and performance stats.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How the Plugin\u2019s Shortcodes Work<\/strong><\/h3>\n\n\n\n<p>If an admin wants to display posts based on <strong>views<\/strong> or <strong>comments<\/strong>, the plugin provides simple shortcode options:<\/p>\n\n\n\n<ul>\n<li><strong>View-based shortcode:<\/strong> Fetches and displays posts with the <strong>highest number of views<\/strong>, ensuring that top-performing articles appear first.<\/li>\n\n\n\n<li><strong>Comment-based shortcode:<\/strong> Highlights posts with the <strong>most user engagement<\/strong> by showing content with the <strong>highest comment count<\/strong>.<\/li>\n<\/ul>\n\n\n\n<p>This <strong>dynamic functionality<\/strong> ensures that the displayed content always aligns with the chosen metric <strong>views or comments<\/strong> helping site owners engage visitors by showcasing <strong>trending or highly discussed posts<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"437\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/image-1-1024x437.png\" alt=\"image-1\" class=\"wp-image-20733\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Arbitrary Shortcode Injection Vulnerability<\/strong><\/h2>\n\n\n\n<p>The <strong>Arbitrary Shortcode Injection Vulnerability<\/strong> occurs when an attacker exploits a flaw in a web application, typically in a plugin or theme of a Content Management System (CMS) like WordPress, to inject malicious shortcodes into a website.&nbsp;<\/p>\n\n\n\n<p>Shortcodes are a CMS feature that allows users to insert dynamic content into posts or pages using predefined tags, like <strong>[shortcode]<\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Key Characteristics of the Vulnerability:<\/strong><\/h3>\n\n\n\n<ol>\n<li><strong>Lack of Input Validation<\/strong>: The vulnerability usually stems from a lack of proper sanitization or validation of user input in functions that handle shortcode execution.<\/li>\n\n\n\n<li><strong>Unauthorized Access<\/strong>: An attacker might exploit insufficient permission checks to insert shortcodes into content areas they should not have access to, such as admin-only pages.<\/li>\n<\/ol>\n\n\n\n<p><strong>Execution of Arbitrary Code<\/strong>: Injected shortcodes can execute server-side code, display sensitive data, or perform unauthorized actions, depending on the functionality of the shortcodes.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Identify Short-code Injection :<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Identify Input Points:<\/strong><\/h3>\n\n\n\n<ul>\n<li>Locate a field or endpoint where the plugin processes user inputs, such as:\n<ul>\n<li>Post or page creation areas.<\/li>\n\n\n\n<li>Comment sections (if enabled).<\/li>\n\n\n\n<li>Any feature allowing user input related to the plugin.<br><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Inject Shortcodes:<\/strong><\/h3>\n\n\n\n<ul>\n<li>Craft a payload containing malicious shortcodes.<br><strong>[popular-posts attribute=&#8221;malicious_code&#8221;]<\/strong><strong><br><\/strong><\/li>\n\n\n\n<li>Using curl\n<ul>\n<li>curl -X POST \\ -d &#8220;content=[popular-posts attribute=&#8217;malicious_payload&#8217;]&#8221; \\ https:\/\/your-test-site.com\/wp-json\/wp\/v2\/posts<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li>Submit this payload through:\n<ul>\n<li>A post\/page editor.<\/li>\n\n\n\n<li>API endpoints, if exposed (e.g., via \/wp-json).<\/li>\n\n\n\n<li>A form input field related to the plugin.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Observe Execution:<\/strong><\/h3>\n\n\n\n<ul>\n<li>View the content on the front end of the website or in any area where the input is rendered.<\/li>\n\n\n\n<li>If the vulnerability exists, the injected shortcode will execute on the server side, displaying unintended results or performing malicious actions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Confirm Exploitation:<\/strong><\/h3>\n\n\n\n<ul>\n<li>Look for signs of successful injection, such as:\n<ul>\n<li>Sensitive data is displayed on the page.<\/li>\n\n\n\n<li>Unexpected changes in content or layout.<\/li>\n\n\n\n<li>Execution of server-side commands (if RCE is achievable).<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>For a better understanding, please refer to the diagram below:-<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/Untitled-Diagram.drawio3.png\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"461\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/Untitled-Diagram.drawio3.png\" alt=\"Untitled-Diagram.drawio3\" class=\"wp-image-20735\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Impact of Shortcode Injection Vulnerability on Your Website:-<\/strong><\/h2>\n\n\n\n<p>The <strong>Arbitrary Shortcode Injection Vulnerability<\/strong> in the WordPress Popular Posts plugin can lead to severe consequences, including:<\/p>\n\n\n\n<ol>\n<li><strong>Unauthorized Actions<\/strong>: Attackers can modify or execute site functions via malicious shortcodes.<\/li>\n\n\n\n<li><strong>Information Disclosure<\/strong>: Sensitive data, like user details, could be exposed.<\/li>\n\n\n\n<li><strong>Malicious Content Injection<\/strong>: Redirection to phishing sites or loading malware.<\/li>\n\n\n\n<li><strong>Remote Code Execution (RCE)<\/strong>: Potential for attackers to execute server-side commands.<\/li>\n\n\n\n<li><strong>SEO Manipulation<\/strong>: Injection of spammy links harms SEO and site reputation.<\/li>\n\n\n\n<li><strong>Site Performance Issues<\/strong>: Overloading the server or causing errors.<\/li>\n\n\n\n<li><strong>Reputational Damage<\/strong>: Loss of trust from users and potential legal liabilities.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Follow these steps to prevent your website from this vulnerability<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>1. Update Plugins and Themes<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Regular Updates<\/strong>: Always use the latest version of the WordPress Popular Posts plugin. Developers frequently release patches for known vulnerabilities.<\/li>\n\n\n\n<li><strong>Enable Auto-Updates<\/strong>: Consider enabling automatic updates for plugins and themes to ensure timely patching.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"402\" src=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/image-2-1024x402.png\" alt=\"image-2\" class=\"wp-image-20736\" \/><\/a><\/figure>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;                                  <strong>Fig:-03(Update plugin version 7.1.0 to 7.2.0 or higher version)<\/strong><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>2. Implement Strong Input Validation&nbsp;<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Sanitize Inputs<\/strong>: Use functions like sanitize_text_field(), esc_attr(), and esc_html() to clean user inputs before processing.<\/li>\n\n\n\n<li><strong>Escape Outputs<\/strong>: Before rendering content, escape the output using WordPress sanitization functions.<\/li>\n\n\n\n<li>Ensure shortcode attributes are validated with functions like shortcode_atts() to define allowed attributes.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>3. Restrict Shortcode Execution<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Role-Based Access<\/strong>: Restrict shortcode execution to trusted user roles (e.g., administrators or editors).<\/li>\n\n\n\n<li>Use current_user_can() to ensure only authorized users can add or execute shortcodes.<\/li>\n\n\n\n<li><strong>Disable Shortcodes for Untrusted Users<\/strong>:<br><br>add_filter(&#8216;the_content&#8217;, function($content) {<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;if (!current_user_can(&#8216;edit_posts&#8217;)) {<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$content = strip_shortcodes($content);<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;}<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;return $content;<\/p>\n\n\n\n<p>});<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>4. Disable Unused Shortcodes<\/strong><\/h3>\n\n\n\n<p>Remove or disable any unnecessary shortcodes to reduce the attack surface:<br>remove_shortcode(&#8216;popular-posts&#8217;);<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>5. Secure API Endpoints<\/strong><\/h3>\n\n\n\n<ul>\n<li>For REST API endpoints exposed by the plugin:\n<ul>\n<li><strong>Authentication<\/strong>: Ensure endpoints require proper user authentication.<\/li>\n\n\n\n<li><strong>Input Validation<\/strong>: Validate all input received through API calls.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>6. Enable a Web Application Firewall (WAF)<\/strong><\/h3>\n\n\n\n<ul>\n<li>Deploy a WAF like <strong>Cloudflare<\/strong>, <strong>Sucuri<\/strong>, or <strong>Wordfence<\/strong> to filter and block malicious requests, including shortcode injection attempts.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Conclusion:-<\/strong><\/h2>\n\n\n\n<p>The <strong>Arbitrary Shortcode Injection Vulnerability<\/strong> in the WordPress Popular Posts plugin highlights the importance of secure coding practices and proactive website management.&nbsp;<\/p>\n\n\n\n<p>This vulnerability can allow attackers to inject malicious shortcodes, leading to severe consequences such as unauthorized actions, data leakage, or even full server compromise.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Need Support?<\/h2>\n\n\n\n<p>Thank You for reading this Blog!<\/p>\n\n\n\n<p>For further more interesting blogs, keep in touch with us. If you need any kind of support, simply raise a ticket at&nbsp;<strong><a href=\"https:\/\/webkul.uvdesk.com\/en\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/webkul.uvdesk.com\/en\/<\/a><\/strong><\/p>\n\n\n\n<p><strong>For further help or queries, please&nbsp;<a href=\"https:\/\/cloudkul.com\/contact\/\">contact<\/a>&nbsp;us or raise a&nbsp;<a href=\"https:\/\/webkul.uvdesk.com\/en\/customer\/create-ticket\/\" target=\"_blank\" rel=\"noreferrer noopener\">ticket<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A high-severity vulnerability has been discovered in the WordPress Popular Posts plugin, which is currently <a class=\"text-primary\" title=\"read more\" href=\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":53,"featured_media":20744,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1],"tags":[16,3,178,231,916,556,915,917],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Warning: Critical Flaw in WordPress Popular Posts Plugin - Cloudkul<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Warning: Critical Flaw in WordPress Popular Posts Plugin - Cloudkul\" \/>\n<meta property=\"og:description\" content=\"A high-severity vulnerability has been discovered in the WordPress Popular Posts plugin, which is currently [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/\" \/>\n<meta property=\"og:site_name\" content=\"Cloudkul\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-29T11:55:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T11:59:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/Short-code.png\" \/>\n\t<meta property=\"og:image:width\" content=\"421\" \/>\n\t<meta property=\"og:image:height\" content=\"206\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gulshan Kumar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/\",\"url\":\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/\",\"name\":\"Warning: Critical Flaw in WordPress Popular Posts Plugin - Cloudkul\",\"isPartOf\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\"},\"datePublished\":\"2025-10-29T11:55:50+00:00\",\"dateModified\":\"2025-10-29T11:59:15+00:00\",\"author\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/6c3ed9f0d7a4e116e7dc6e4c7a98b9b8\"},\"breadcrumb\":{\"@id\":\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cloudkul.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Warning: Critical Flaw in WordPress Popular Posts Plugin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#website\",\"url\":\"https:\/\/cloudkul.com\/blog\/\",\"name\":\"Cloudkul\",\"description\":\"Host your eCommerce Store on AWS with Optimized Performance\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cloudkul.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/6c3ed9f0d7a4e116e7dc6e4c7a98b9b8\",\"name\":\"Gulshan Kumar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c87a95bf6e09a6f19fcdb7c8a6d6641f?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c87a95bf6e09a6f19fcdb7c8a6d6641f?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g\",\"caption\":\"Gulshan Kumar\"},\"url\":\"https:\/\/cloudkul.com\/blog\/author\/gulshankumar-cloud909\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Warning: Critical Flaw in WordPress Popular Posts Plugin - Cloudkul","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/","og_locale":"en_US","og_type":"article","og_title":"Warning: Critical Flaw in WordPress Popular Posts Plugin - Cloudkul","og_description":"A high-severity vulnerability has been discovered in the WordPress Popular Posts plugin, which is currently [...]","og_url":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/","og_site_name":"Cloudkul","article_published_time":"2025-10-29T11:55:50+00:00","article_modified_time":"2025-10-29T11:59:15+00:00","og_image":[{"width":421,"height":206,"url":"https:\/\/cloudkul.com\/blog\/wp-content\/uploads\/2025\/10\/Short-code.png","type":"image\/png"}],"author":"Gulshan Kumar","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/","url":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/","name":"Warning: Critical Flaw in WordPress Popular Posts Plugin - Cloudkul","isPartOf":{"@id":"https:\/\/cloudkul.com\/blog\/#website"},"datePublished":"2025-10-29T11:55:50+00:00","dateModified":"2025-10-29T11:59:15+00:00","author":{"@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/6c3ed9f0d7a4e116e7dc6e4c7a98b9b8"},"breadcrumb":{"@id":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cloudkul.com\/blog\/shortcode-injection-wordpress-popular-posts-plugin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cloudkul.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Warning: Critical Flaw in WordPress Popular Posts Plugin"}]},{"@type":"WebSite","@id":"https:\/\/cloudkul.com\/blog\/#website","url":"https:\/\/cloudkul.com\/blog\/","name":"Cloudkul","description":"Host your eCommerce Store on AWS with Optimized Performance","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cloudkul.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/6c3ed9f0d7a4e116e7dc6e4c7a98b9b8","name":"Gulshan Kumar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cloudkul.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c87a95bf6e09a6f19fcdb7c8a6d6641f?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c87a95bf6e09a6f19fcdb7c8a6d6641f?s=96&d=https%3A%2F%2Fs.gravatar.com%2Favatar%2F6148c37469011bc2f8e491ca8f5de495%3Fs%3D80&r=g","caption":"Gulshan Kumar"},"url":"https:\/\/cloudkul.com\/blog\/author\/gulshankumar-cloud909\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/20730"}],"collection":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/comments?post=20730"}],"version-history":[{"count":8,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/20730\/revisions"}],"predecessor-version":[{"id":20804,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/posts\/20730\/revisions\/20804"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media\/20744"}],"wp:attachment":[{"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/media?parent=20730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/categories?post=20730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloudkul.com\/blog\/wp-json\/wp\/v2\/tags?post=20730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}