CVE-2025-2169: CWE-94 Improper Control of Generation of Code ('Code Injection') in realmag777 WPCS – WordPress Currency Switcher Professional
CVE-2025-2169 is a high-severity vulnerability in the WPCS – WordPress Currency Switcher Professional plugin allowing unauthenticated attackers to execute arbitrary shortcodes due to improper validation before do_shortcode execution. This code injection flaw (CWE-94) affects all versions up to 1. 2. 0. 4 and can lead to partial confidentiality, integrity, and availability impacts without requiring user interaction or authentication. Exploitation is remote and straightforward, making it a significant risk for WordPress sites using this plugin. Although no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a critical concern for website administrators. Mitigation requires immediate plugin update once available or disabling the plugin until patched. Organizations relying on this plugin should monitor for updates and consider additional web application firewall rules to block suspicious shortcode execution attempts. Countries with large WordPress user bases and e-commerce activity, such as the United States, Germany, United Kingdom, Australia, Canada, and India, are particularly at risk due to the plugin's usage in currency switching for online stores.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-2169 affects the WPCS – WordPress Currency Switcher Professional plugin, a popular tool used to manage currency switching on WordPress e-commerce sites. The flaw is a code injection vulnerability categorized under CWE-94, stemming from improper control over the generation and execution of code. Specifically, the plugin fails to properly validate user-supplied input before passing it to WordPress's do_shortcode function, which processes shortcodes embedded in content. This improper validation allows unauthenticated attackers to craft malicious requests that execute arbitrary shortcodes on the target site. Since shortcodes can invoke PHP functions or other plugin features, this can lead to unauthorized code execution, potentially compromising site confidentiality, integrity, and availability. The vulnerability affects all versions up to and including 1.2.0.4. The CVSS v3.1 base score is 7.3, reflecting a high severity due to network attack vector, no required privileges or user interaction, and impacts on confidentiality, integrity, and availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability is critical for sites that rely on this plugin, especially those handling sensitive financial transactions or customer data.
Potential Impact
The impact of CVE-2025-2169 is significant for organizations using the vulnerable plugin. Successful exploitation can allow attackers to execute arbitrary shortcodes remotely without authentication, potentially leading to unauthorized code execution. This can result in data leakage (confidentiality impact), unauthorized modification of site content or configuration (integrity impact), and disruption or defacement of the website (availability impact). For e-commerce sites, this could mean theft of customer data, manipulation of pricing or currency information, or complete site takeover. The ease of exploitation and lack of required privileges increase the risk of widespread attacks. Organizations may face reputational damage, regulatory penalties for data breaches, and operational downtime. The vulnerability also opens a pathway for further attacks such as malware deployment, phishing, or lateral movement within the hosting environment.
Mitigation Recommendations
Immediate mitigation involves disabling the WPCS – WordPress Currency Switcher Professional plugin until a security patch is released. Administrators should monitor the vendor’s official channels for updates and apply patches promptly once available. In the interim, implementing web application firewall (WAF) rules to detect and block suspicious shortcode execution patterns can reduce risk. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can limit exposure. Regularly auditing installed plugins and removing unused or unmaintained ones reduces attack surface. Additionally, enforcing the principle of least privilege for WordPress users and maintaining up-to-date backups ensures recovery capability. Security teams should also monitor logs for unusual shortcode execution attempts and consider deploying intrusion detection systems tailored to WordPress environments.
Affected Countries
United States, Germany, United Kingdom, Australia, Canada, India, France, Brazil, Netherlands, Japan
CVE-2025-2169: CWE-94 Improper Control of Generation of Code ('Code Injection') in realmag777 WPCS – WordPress Currency Switcher Professional
Description
CVE-2025-2169 is a high-severity vulnerability in the WPCS – WordPress Currency Switcher Professional plugin allowing unauthenticated attackers to execute arbitrary shortcodes due to improper validation before do_shortcode execution. This code injection flaw (CWE-94) affects all versions up to 1. 2. 0. 4 and can lead to partial confidentiality, integrity, and availability impacts without requiring user interaction or authentication. Exploitation is remote and straightforward, making it a significant risk for WordPress sites using this plugin. Although no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a critical concern for website administrators. Mitigation requires immediate plugin update once available or disabling the plugin until patched. Organizations relying on this plugin should monitor for updates and consider additional web application firewall rules to block suspicious shortcode execution attempts. Countries with large WordPress user bases and e-commerce activity, such as the United States, Germany, United Kingdom, Australia, Canada, and India, are particularly at risk due to the plugin's usage in currency switching for online stores.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-2169 affects the WPCS – WordPress Currency Switcher Professional plugin, a popular tool used to manage currency switching on WordPress e-commerce sites. The flaw is a code injection vulnerability categorized under CWE-94, stemming from improper control over the generation and execution of code. Specifically, the plugin fails to properly validate user-supplied input before passing it to WordPress's do_shortcode function, which processes shortcodes embedded in content. This improper validation allows unauthenticated attackers to craft malicious requests that execute arbitrary shortcodes on the target site. Since shortcodes can invoke PHP functions or other plugin features, this can lead to unauthorized code execution, potentially compromising site confidentiality, integrity, and availability. The vulnerability affects all versions up to and including 1.2.0.4. The CVSS v3.1 base score is 7.3, reflecting a high severity due to network attack vector, no required privileges or user interaction, and impacts on confidentiality, integrity, and availability. No patches or fixes have been published at the time of disclosure, and no known exploits have been observed in the wild. The vulnerability is critical for sites that rely on this plugin, especially those handling sensitive financial transactions or customer data.
Potential Impact
The impact of CVE-2025-2169 is significant for organizations using the vulnerable plugin. Successful exploitation can allow attackers to execute arbitrary shortcodes remotely without authentication, potentially leading to unauthorized code execution. This can result in data leakage (confidentiality impact), unauthorized modification of site content or configuration (integrity impact), and disruption or defacement of the website (availability impact). For e-commerce sites, this could mean theft of customer data, manipulation of pricing or currency information, or complete site takeover. The ease of exploitation and lack of required privileges increase the risk of widespread attacks. Organizations may face reputational damage, regulatory penalties for data breaches, and operational downtime. The vulnerability also opens a pathway for further attacks such as malware deployment, phishing, or lateral movement within the hosting environment.
Mitigation Recommendations
Immediate mitigation involves disabling the WPCS – WordPress Currency Switcher Professional plugin until a security patch is released. Administrators should monitor the vendor’s official channels for updates and apply patches promptly once available. In the interim, implementing web application firewall (WAF) rules to detect and block suspicious shortcode execution patterns can reduce risk. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can limit exposure. Regularly auditing installed plugins and removing unused or unmaintained ones reduces attack surface. Additionally, enforcing the principle of least privilege for WordPress users and maintaining up-to-date backups ensures recovery capability. Security teams should also monitor logs for unusual shortcode execution attempts and consider deploying intrusion detection systems tailored to WordPress environments.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-03-10T14:31:22.621Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b1fb7ef31ef0b54e54f
Added to database: 2/25/2026, 9:35:27 PM
Last enriched: 2/25/2026, 10:18:21 PM
Last updated: 2/26/2026, 7:26:13 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.