CVE-2025-11920: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in whyun WPCOM Member
The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI Analysis
Technical Summary
CVE-2025-11920 is a Local File Inclusion vulnerability classified under CWE-98, affecting the WPCOM Member plugin for WordPress in all versions up to 1.7.14. The vulnerability arises from improper control of the filename used in an include or require statement within the plugin's shortcode handling, specifically via the 'action' parameter. Authenticated users with Contributor-level permissions or higher can exploit this flaw to include arbitrary .php files from the server, leading to remote code execution. This is possible because the plugin fails to properly validate or sanitize the input controlling which files are included, allowing attackers to execute any PHP code contained in those files. The exploit does not require user interaction beyond authentication, and the attack vector is network-based. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, data exposure, and potential site takeover. Although no public exploits are reported yet, the high CVSS score of 8.8 reflects the severity and ease of exploitation given the low access complexity and lack of required user interaction. The vulnerability is particularly dangerous in environments where users can upload PHP files, as these can be included and executed via the flaw. The plugin is widely used in WordPress environments, making this a significant threat to websites relying on it for membership management.
Potential Impact
For European organizations, this vulnerability poses a significant risk of website compromise, data breaches, and service disruption. Exploitation could lead to unauthorized access to sensitive customer or internal data, defacement or manipulation of web content, and use of the compromised server as a pivot point for further attacks within the network. Organizations in sectors such as e-commerce, media, and membership-based services that rely on WordPress and the WPCOM Member plugin are particularly vulnerable. The ability for relatively low-privileged users to execute arbitrary code increases the threat landscape, especially in environments with multiple contributors or editors. This could also impact GDPR compliance due to potential data exposure. Additionally, the disruption of web services could affect business continuity and reputation. Given the widespread use of WordPress in Europe, the vulnerability could have broad implications if not addressed promptly.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level user permissions to prevent exploitation until a patch is available. Organizations should audit user roles and reduce privileges where possible, especially limiting the ability to upload or manage PHP files. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting the 'action' parameter in WPCOM Member shortcodes can provide temporary protection. Monitoring logs for unusual file inclusion attempts or anomalous shortcode usage is critical. If feasible, disabling or removing the WPCOM Member plugin until a secure version is released is recommended. Organizations should also ensure that file upload functionality is tightly controlled and that uploaded files are sanitized and validated to prevent malicious PHP uploads. Once a patch is released, prompt application is essential. Additionally, conducting regular security assessments and penetration testing focused on WordPress plugins can help identify similar risks proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11920: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in whyun WPCOM Member
Description
The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
AI-Powered Analysis
Technical Analysis
CVE-2025-11920 is a Local File Inclusion vulnerability classified under CWE-98, affecting the WPCOM Member plugin for WordPress in all versions up to 1.7.14. The vulnerability arises from improper control of the filename used in an include or require statement within the plugin's shortcode handling, specifically via the 'action' parameter. Authenticated users with Contributor-level permissions or higher can exploit this flaw to include arbitrary .php files from the server, leading to remote code execution. This is possible because the plugin fails to properly validate or sanitize the input controlling which files are included, allowing attackers to execute any PHP code contained in those files. The exploit does not require user interaction beyond authentication, and the attack vector is network-based. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, data exposure, and potential site takeover. Although no public exploits are reported yet, the high CVSS score of 8.8 reflects the severity and ease of exploitation given the low access complexity and lack of required user interaction. The vulnerability is particularly dangerous in environments where users can upload PHP files, as these can be included and executed via the flaw. The plugin is widely used in WordPress environments, making this a significant threat to websites relying on it for membership management.
Potential Impact
For European organizations, this vulnerability poses a significant risk of website compromise, data breaches, and service disruption. Exploitation could lead to unauthorized access to sensitive customer or internal data, defacement or manipulation of web content, and use of the compromised server as a pivot point for further attacks within the network. Organizations in sectors such as e-commerce, media, and membership-based services that rely on WordPress and the WPCOM Member plugin are particularly vulnerable. The ability for relatively low-privileged users to execute arbitrary code increases the threat landscape, especially in environments with multiple contributors or editors. This could also impact GDPR compliance due to potential data exposure. Additionally, the disruption of web services could affect business continuity and reputation. Given the widespread use of WordPress in Europe, the vulnerability could have broad implications if not addressed promptly.
Mitigation Recommendations
Immediate mitigation steps include restricting Contributor-level user permissions to prevent exploitation until a patch is available. Organizations should audit user roles and reduce privileges where possible, especially limiting the ability to upload or manage PHP files. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting the 'action' parameter in WPCOM Member shortcodes can provide temporary protection. Monitoring logs for unusual file inclusion attempts or anomalous shortcode usage is critical. If feasible, disabling or removing the WPCOM Member plugin until a secure version is released is recommended. Organizations should also ensure that file upload functionality is tightly controlled and that uploaded files are sanitized and validated to prevent malicious PHP uploads. Once a patch is released, prompt application is essential. Additionally, conducting regular security assessments and penetration testing focused on WordPress plugins can help identify similar risks proactively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-17T16:47:34.805Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690567f271a6fc4aff36b3ed
Added to database: 11/1/2025, 1:52:50 AM
Last enriched: 11/1/2025, 2:07:51 AM
Last updated: 11/1/2025, 3:49:10 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-36367: CWE-862 Missing Authorization
HighCVE-2025-6990: CWE-94 Improper Control of Generation of Code ('Code Injection') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
HighCVE-2025-6988: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hogash KALLYAS - Creative eCommerce Multi-Purpose WordPress Theme
MediumCVE-2025-6574: CWE-639 Authorization Bypass Through User-Controlled Key in aonetheme Service Finder Bookings
HighCVE-2025-12171: CWE-434 Unrestricted Upload of File with Dangerous Type in anthonyeden RESTful Content Syndication
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.