CVE-2025-12813: CWE-94 Improper Control of Generation of Code ('Code Injection') in strix-bubol5 Holiday class post calendar
The Holiday class post calendar plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.1 via the 'contents' parameter. This is due to a lack of sanitization of user-supplied data when creating a cache file. This makes it possible for unauthenticated attackers to execute code on the server.
AI Analysis
Technical Summary
CVE-2025-12813 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Holiday class post calendar plugin for WordPress, developed by strix-bubol5. This vulnerability affects all versions up to and including 7.1. The root cause is the lack of proper sanitization of user-supplied input in the 'contents' parameter when the plugin creates a cache file. Because the input is not sanitized, an attacker can inject malicious code that the server executes, resulting in remote code execution (RCE). The vulnerability is exploitable remotely without authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score is 9.8, reflecting its critical severity with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, as attackers can execute arbitrary commands, potentially leading to full system compromise. Although no patches or fixes are currently available, the vulnerability has been publicly disclosed, increasing the risk of exploitation. No known exploits have been detected in the wild yet, but the exposure window is significant due to the plugin's widespread use in WordPress environments. The vulnerability demands urgent attention from administrators and security teams to prevent exploitation.
Potential Impact
The impact of CVE-2025-12813 is severe for organizations worldwide using the Holiday class post calendar plugin. Successful exploitation allows unauthenticated attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches, defacement of websites, deployment of malware or ransomware, lateral movement within networks, and disruption of services. The confidentiality of sensitive data stored or processed by the affected WordPress sites can be compromised, and the integrity of website content can be altered maliciously. Availability may also be impacted if attackers disrupt or disable the website or underlying infrastructure. Given WordPress's dominant market share in content management systems globally, many organizations, including businesses, government agencies, and non-profits, could be affected. The lack of authentication and user interaction requirements makes this vulnerability highly exploitable, increasing the risk of widespread attacks once exploit code becomes available.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Immediately disable or remove the Holiday class post calendar plugin from WordPress installations to eliminate the attack surface. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious payloads targeting the 'contents' parameter. 3) Restrict access to the affected plugin endpoints by IP whitelisting or network segmentation to limit exposure. 4) Monitor web server and application logs for unusual or unauthorized requests that may indicate exploitation attempts. 5) Harden WordPress environments by ensuring least privilege for web server processes and disabling unnecessary PHP functions that could be leveraged for code execution. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of affected systems. 7) Educate administrators and developers about secure coding practices, especially input validation and sanitization, to prevent similar vulnerabilities. 8) Consider implementing intrusion detection systems (IDS) to alert on anomalous activities related to this vulnerability. These targeted actions go beyond generic advice and focus on immediate risk reduction and preparation for remediation.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2025-12813: CWE-94 Improper Control of Generation of Code ('Code Injection') in strix-bubol5 Holiday class post calendar
Description
The Holiday class post calendar plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.1 via the 'contents' parameter. This is due to a lack of sanitization of user-supplied data when creating a cache file. This makes it possible for unauthenticated attackers to execute code on the server.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12813 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Holiday class post calendar plugin for WordPress, developed by strix-bubol5. This vulnerability affects all versions up to and including 7.1. The root cause is the lack of proper sanitization of user-supplied input in the 'contents' parameter when the plugin creates a cache file. Because the input is not sanitized, an attacker can inject malicious code that the server executes, resulting in remote code execution (RCE). The vulnerability is exploitable remotely without authentication or user interaction, making it highly dangerous. The CVSS v3.1 base score is 9.8, reflecting its critical severity with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact covers confidentiality, integrity, and availability, as attackers can execute arbitrary commands, potentially leading to full system compromise. Although no patches or fixes are currently available, the vulnerability has been publicly disclosed, increasing the risk of exploitation. No known exploits have been detected in the wild yet, but the exposure window is significant due to the plugin's widespread use in WordPress environments. The vulnerability demands urgent attention from administrators and security teams to prevent exploitation.
Potential Impact
The impact of CVE-2025-12813 is severe for organizations worldwide using the Holiday class post calendar plugin. Successful exploitation allows unauthenticated attackers to execute arbitrary code on the web server, potentially leading to full system compromise. This can result in data breaches, defacement of websites, deployment of malware or ransomware, lateral movement within networks, and disruption of services. The confidentiality of sensitive data stored or processed by the affected WordPress sites can be compromised, and the integrity of website content can be altered maliciously. Availability may also be impacted if attackers disrupt or disable the website or underlying infrastructure. Given WordPress's dominant market share in content management systems globally, many organizations, including businesses, government agencies, and non-profits, could be affected. The lack of authentication and user interaction requirements makes this vulnerability highly exploitable, increasing the risk of widespread attacks once exploit code becomes available.
Mitigation Recommendations
Until an official patch is released, organizations should implement several specific mitigations: 1) Immediately disable or remove the Holiday class post calendar plugin from WordPress installations to eliminate the attack surface. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests containing malicious payloads targeting the 'contents' parameter. 3) Restrict access to the affected plugin endpoints by IP whitelisting or network segmentation to limit exposure. 4) Monitor web server and application logs for unusual or unauthorized requests that may indicate exploitation attempts. 5) Harden WordPress environments by ensuring least privilege for web server processes and disabling unnecessary PHP functions that could be leveraged for code execution. 6) Prepare for rapid deployment of patches once available by maintaining an up-to-date inventory of affected systems. 7) Educate administrators and developers about secure coding practices, especially input validation and sanitization, to prevent similar vulnerabilities. 8) Consider implementing intrusion detection systems (IDS) to alert on anomalous activities related to this vulnerability. These targeted actions go beyond generic advice and focus on immediate risk reduction and preparation for remediation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T16:32:17.929Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912b13414bc3e00ba783de2
Added to database: 11/11/2025, 3:44:52 AM
Last enriched: 2/27/2026, 9:10:46 PM
Last updated: 3/24/2026, 7:44:03 AM
Views: 149
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.