Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2169: CWE-94 Improper Control of Generation of Code ('Code Injection') in realmag777 WPCS – WordPress Currency Switcher Professional

0
High
VulnerabilityCVE-2025-2169cvecve-2025-2169cwe-94
Published: Tue Mar 11 2025 (03/11/2025, 03:22:19 UTC)
Source: CVE Database V5
Vendor/Project: realmag777
Product: WPCS – WordPress Currency Switcher Professional

Description

CVE-2025-2169 is a high-severity vulnerability in the WPCS – WordPress Currency Switcher Professional plugin allowing unauthenticated attackers to execute arbitrary shortcodes due to improper validation before do_shortcode execution. This code injection flaw (CWE-94) affects all versions up to 1. 2. 0. 4 and can lead to partial confidentiality, integrity, and availability impacts without requiring user interaction or authentication. Exploitation is remote and straightforward, making it a significant risk for WordPress sites using this plugin. Although no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a critical concern for website administrators. Mitigation requires immediate plugin update once available or disabling the plugin until patched. Organizations relying on this plugin should monitor for updates and consider additional web application firewall rules to block suspicious shortcode execution attempts. Countries with large WordPress user bases and e-commerce activity, such as the United States, Germany, United Kingdom, Australia, Canada, and India, are particularly at risk due to the plugin's usage in currency switching for online stores.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:18:21 UTC

Technical Analysis

The vulnerability identified as CVE-2025-2169 affects the WPCS – WordPress Currency Switcher Professional plugin, a popular tool used to manage currency switching on WordPress e-commerce sites. The flaw is a code injection vulnerability categorized under CWE-94, stemming from improper control over the generation and execution of code. Specifically, the plugin fails to properly validate user-supplied input before passing it to WordPress's do_shortcode function, which processes shortcodes embedded in content. This improper validation allows unauthenticated attackers to craft malicious requests that execute arbitrary shortcodes on the target site. Since shortcodes can invoke PHP functions or other plugin features, this can lead to unauthorized code execution, potentially compromising site confidentiality, integrity, and availability. The vulnerability affects all versions up to and including 1.2.0.4. The CVSS v3.1 base score is 7.3, reflecting a high severity due to network attack vector, no required privileges or user interaction, and impacts on confidentiality, integrity, and availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability is critical for sites that rely on this plugin, especially those handling sensitive financial transactions or customer data.

Potential Impact

The impact of CVE-2025-2169 is significant for organizations using the vulnerable plugin. Successful exploitation can allow attackers to execute arbitrary shortcodes remotely without authentication, potentially leading to unauthorized code execution. This can result in data leakage (confidentiality impact), unauthorized modification of site content or configuration (integrity impact), and disruption or defacement of the website (availability impact). For e-commerce sites, this could mean theft of customer data, manipulation of pricing or currency information, or complete site takeover. The ease of exploitation and lack of required privileges increase the risk of widespread attacks. Organizations may face reputational damage, regulatory penalties for data breaches, and operational downtime. The vulnerability also opens a pathway for further attacks such as malware deployment, phishing, or lateral movement within the hosting environment.

Mitigation Recommendations

Immediate mitigation involves disabling the WPCS – WordPress Currency Switcher Professional plugin until a security patch is released. Administrators should monitor the vendor’s official channels for updates and apply patches promptly once available. In the interim, implementing web application firewall (WAF) rules to detect and block suspicious shortcode execution patterns can reduce risk. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can limit exposure. Regularly auditing installed plugins and removing unused or unmaintained ones reduces attack surface. Additionally, enforcing the principle of least privilege for WordPress users and maintaining up-to-date backups ensures recovery capability. Security teams should also monitor logs for unusual shortcode execution attempts and consider deploying intrusion detection systems tailored to WordPress environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-10T14:31:22.621Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1fb7ef31ef0b54e54f

Added to database: 2/25/2026, 9:35:27 PM

Last enriched: 2/25/2026, 10:18:21 PM

Last updated: 2/26/2026, 7:26:13 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats