Plugin Vulnerability Hub
Plugin 1 known issue Latest disclosed Sep 22, 2020

Coditor – Code Editor Vulnerabilities

Review known vulnerability records for the WordPress plugin Coditor – Code Editor (`coditor`), including severity, CVE references, affected versions, and patch status.

Known Records
1
High or Critical
1
Patch Coverage
100%
Last Updated
Jan 22, 2024
Related Security Guides

Use these guides while reviewing Coditor – Code Editor fixes

Pair this plugin vulnerability hub with practical WordPress hardening, scanner, and patch workflow guidance.

Patch Decision Workflow

How to prioritize Coditor – Code Editor remediation

Use the hub as a decision layer before opening individual records: confirm whether the issue has a CVE, whether a fixed version exists, and whether the affected range overlaps production installs.

Search-Ready Records
1
1. Match the Package
Confirm the installed WordPress plugin slug is coditor before acting on any CVE from this cluster.
2. Sort by Severity
Start with 1 high or critical record, then review medium and unrated findings with public references.
3. Check Patch Evidence
1 record include a patch path; verify compatibility before closing the finding.
4. Monitor Gaps
0 records still lack a listed fixed release, so keep this hub in the review queue.
Coverage Snapshot

What this page helps you verify fast

This hub clusters tracked records for Coditor – Code Editor so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
1 record include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
0 critical and 1 high severity finding.
Recent CVEs
This page still provides patch and version coverage even when a CVE ID is not listed.
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Coditor – Code Editor

Sorted by latest disclosure date so newly published issues surface first.

Plugin High Patched: No
Coditor <= 1.1 - Remote Code Execution

The Coditor plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1 via the coditor_process_ajax function. This allows authenticated attackers at the subscriber-level or above to execute code on the server.

Published
Sep 22, 2020
Patched Release
Not published
Affected Versions
Versions up to 1.1
Next Step
Open the full report for remediation notes and references.