Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12813: CWE-94 Improper Control of Generation of Code ('Code Injection') in strix-bubol5 Holiday class post calendar

0
Critical
VulnerabilityCVE-2025-12813cvecve-2025-12813cwe-94
Published: Tue Nov 11 2025 (11/11/2025, 03:30:43 UTC)
Source: CVE Database V5
Vendor/Project: strix-bubol5
Product: Holiday class post calendar

Description

The Holiday class post calendar plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.1 via the 'contents' parameter. This is due to a lack of sanitization of user-supplied data when creating a cache file. This makes it possible for unauthenticated attackers to execute code on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:10:46 UTC

Technical Analysis

CVE-2025-12813 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Holiday class post calendar plugin for WordPress, developed by strix-bubol5. This vulnerability affects all versions up to and including 7.1. The root cause is the lack of proper sanitization of user-supplied input in the 'contents' parameter when the plugin creates a cache file. Because the input is not sanitized, an attacker can inject malicious code that the server executes, resulting in remote code execution (RCE). The vulnerability is exploitable remotely without authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score is 9.8, reflecting its critical severity with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, as attackers can execute arbitrary commands, potentially leading to full system compromise. Although no patches or fixes are currently available, the vulnerability has been publicly disclosed, increasing the risk of exploitation. No known exploits have been detected in the wild yet, but the exposure window is significant due to the plugin's widespread use in WordPress environments. The vulnerability demands urgent attention from administrators and security teams to prevent exploitation.

Potential Impact

The impact of CVE-2025-12813 is severe for organizations worldwide using the Holiday class post calendar plugin. Successful exploitation allows unauthenticated attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches, defacement of websites, deployment of malware or ransomware, lateral movement within networks, and disruption of services. The confidentiality of sensitive data stored or processed by the affected WordPress sites can be compromised, and the integrity of website content can be altered maliciously. Availability may also be impacted if attackers disrupt or disable the website or underlying infrastructure. Given WordPress's dominant market share in content management systems globally, many organizations, including businesses, government agencies, and non-profits, could be affected. The lack of authentication and user interaction requirements makes this vulnerability highly exploitable, increasing the risk of widespread attacks once exploit code becomes available.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Immediately disable or remove the Holiday class post calendar plugin from WordPress installations to eliminate the attack surface. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious payloads targeting the 'contents' parameter. 3) Restrict access to the affected plugin endpoints by IP whitelisting or network segmentation to limit exposure. 4) Monitor web server and application logs for unusual or unauthorized requests that may indicate exploitation attempts. 5) Harden WordPress environments by ensuring least privilege for web server processes and disabling unnecessary PHP functions that could be leveraged for code execution. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of affected systems. 7) Educate administrators and developers about secure coding practices, especially input validation and sanitization, to prevent similar vulnerabilities. 8) Consider implementing intrusion detection systems (IDS) to alert on anomalous activities related to this vulnerability. These targeted actions go beyond generic advice and focus on immediate risk reduction and preparation for remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-06T16:32:17.929Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912b13414bc3e00ba783de2

Added to database: 11/11/2025, 3:44:52 AM

Last enriched: 2/27/2026, 9:10:46 PM

Last updated: 3/24/2026, 7:44:03 AM

Views: 149

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses