Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11920: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in whyun WPCOM Member

0
High
VulnerabilityCVE-2025-11920cvecve-2025-11920cwe-98
Published: Sat Nov 01 2025 (11/01/2025, 01:47:41 UTC)
Source: CVE Database V5
Vendor/Project: whyun
Product: WPCOM Member

Description

The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

AI-Powered Analysis

AILast updated: 11/01/2025, 02:07:51 UTC

Technical Analysis

CVE-2025-11920 is a Local File Inclusion vulnerability classified under CWE-98, affecting the WPCOM Member plugin for WordPress in all versions up to 1.7.14. The vulnerability arises from improper control of the filename used in an include or require statement within the plugin's shortcode handling, specifically via the 'action' parameter. Authenticated users with Contributor-level permissions or higher can exploit this flaw to include arbitrary .php files from the server, leading to remote code execution. This is possible because the plugin fails to properly validate or sanitize the input controlling which files are included, allowing attackers to execute any PHP code contained in those files. The exploit does not require user interaction beyond authentication, and the attack vector is network-based. The vulnerability impacts confidentiality, integrity, and availability by enabling unauthorized code execution, data exposure, and potential site takeover. Although no public exploits are reported yet, the high CVSS score of 8.8 reflects the severity and ease of exploitation given the low access complexity and lack of required user interaction. The vulnerability is particularly dangerous in environments where users can upload PHP files, as these can be included and executed via the flaw. The plugin is widely used in WordPress environments, making this a significant threat to websites relying on it for membership management.

Potential Impact

For European organizations, this vulnerability poses a significant risk of website compromise, data breaches, and service disruption. Exploitation could lead to unauthorized access to sensitive customer or internal data, defacement or manipulation of web content, and use of the compromised server as a pivot point for further attacks within the network. Organizations in sectors such as e-commerce, media, and membership-based services that rely on WordPress and the WPCOM Member plugin are particularly vulnerable. The ability for relatively low-privileged users to execute arbitrary code increases the threat landscape, especially in environments with multiple contributors or editors. This could also impact GDPR compliance due to potential data exposure. Additionally, the disruption of web services could affect business continuity and reputation. Given the widespread use of WordPress in Europe, the vulnerability could have broad implications if not addressed promptly.

Mitigation Recommendations

Immediate mitigation steps include restricting Contributor-level user permissions to prevent exploitation until a patch is available. Organizations should audit user roles and reduce privileges where possible, especially limiting the ability to upload or manage PHP files. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting the 'action' parameter in WPCOM Member shortcodes can provide temporary protection. Monitoring logs for unusual file inclusion attempts or anomalous shortcode usage is critical. If feasible, disabling or removing the WPCOM Member plugin until a secure version is released is recommended. Organizations should also ensure that file upload functionality is tightly controlled and that uploaded files are sanitized and validated to prevent malicious PHP uploads. Once a patch is released, prompt application is essential. Additionally, conducting regular security assessments and penetration testing focused on WordPress plugins can help identify similar risks proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-17T16:47:34.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690567f271a6fc4aff36b3ed

Added to database: 11/1/2025, 1:52:50 AM

Last enriched: 11/1/2025, 2:07:51 AM

Last updated: 11/1/2025, 3:49:10 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats