CVE-2025-6744: CWE-94 Improper Control of Generation of Code ('Code Injection') in xTemos Woodmart
The The Woodmart theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.2.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode through the woodmart_get_products_shortcode() function. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2025-6744 is a high-severity vulnerability affecting the Woodmart WordPress theme developed by xTemos, specifically impacting all versions up to and including 8.2.3. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. The root cause lies in the woodmart_get_products_shortcode() function, which improperly validates user-supplied input before passing it to the WordPress do_shortcode function. This flaw allows unauthenticated attackers to execute arbitrary shortcodes on the affected WordPress sites. Since shortcodes in WordPress can execute PHP code or trigger various plugin/theme functionalities, this vulnerability can lead to unauthorized code execution, potentially compromising the confidentiality, integrity, and availability of the affected systems. The CVSS 3.1 base score is 7.3, indicating a high severity, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and an impact on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the ease of exploitation due to lack of authentication and user interaction requirements makes this vulnerability a significant risk for WordPress sites using the Woodmart theme. The absence of official patches at the time of reporting further elevates the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for businesses relying on WordPress websites with the Woodmart theme for e-commerce, marketing, or content delivery. Exploitation could lead to unauthorized code execution, enabling attackers to inject malicious payloads, deface websites, steal sensitive customer data, or pivot to internal networks. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), financial losses, and operational disruptions. Given the widespread use of WordPress in Europe and the popularity of commercial themes like Woodmart, organizations in sectors such as retail, hospitality, and media are particularly vulnerable. The ability to exploit this flaw without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation attempts, potentially affecting a large number of European websites and their users.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting the use of shortcodes in the Woodmart theme until an official patch is released. This can be done by overriding or filtering the woodmart_get_products_shortcode() function to sanitize inputs rigorously or by disabling shortcode processing in vulnerable contexts. 2. Implement Web Application Firewall (WAF) rules specifically targeting suspicious shortcode patterns or attempts to exploit this vulnerability. 3. Monitor web server and application logs for unusual shortcode execution attempts or unexpected requests targeting the vulnerable function. 4. Limit exposure by restricting access to the WordPress admin and theme files via IP whitelisting or VPN access where feasible. 5. Keep WordPress core, plugins, and themes updated and subscribe to vendor security advisories for timely patch releases. 6. Conduct security audits and penetration testing focused on shortcode and code injection vectors to identify and remediate similar issues proactively. 7. Educate site administrators about the risks of installing untrusted plugins or themes and encourage the use of security plugins that can detect and block malicious shortcode usage.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6744: CWE-94 Improper Control of Generation of Code ('Code Injection') in xTemos Woodmart
Description
The The Woodmart theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.2.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode through the woodmart_get_products_shortcode() function. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI-Powered Analysis
Technical Analysis
CVE-2025-6744 is a high-severity vulnerability affecting the Woodmart WordPress theme developed by xTemos, specifically impacting all versions up to and including 8.2.3. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. The root cause lies in the woodmart_get_products_shortcode() function, which improperly validates user-supplied input before passing it to the WordPress do_shortcode function. This flaw allows unauthenticated attackers to execute arbitrary shortcodes on the affected WordPress sites. Since shortcodes in WordPress can execute PHP code or trigger various plugin/theme functionalities, this vulnerability can lead to unauthorized code execution, potentially compromising the confidentiality, integrity, and availability of the affected systems. The CVSS 3.1 base score is 7.3, indicating a high severity, with an attack vector of network (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and an impact on confidentiality, integrity, and availability (C:L/I:L/A:L). Although no known exploits are currently reported in the wild, the ease of exploitation due to lack of authentication and user interaction requirements makes this vulnerability a significant risk for WordPress sites using the Woodmart theme. The absence of official patches at the time of reporting further elevates the urgency for mitigation.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for businesses relying on WordPress websites with the Woodmart theme for e-commerce, marketing, or content delivery. Exploitation could lead to unauthorized code execution, enabling attackers to inject malicious payloads, deface websites, steal sensitive customer data, or pivot to internal networks. This can result in reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), financial losses, and operational disruptions. Given the widespread use of WordPress in Europe and the popularity of commercial themes like Woodmart, organizations in sectors such as retail, hospitality, and media are particularly vulnerable. The ability to exploit this flaw without authentication or user interaction increases the likelihood of automated attacks and widespread exploitation attempts, potentially affecting a large number of European websites and their users.
Mitigation Recommendations
1. Immediate mitigation should include disabling or restricting the use of shortcodes in the Woodmart theme until an official patch is released. This can be done by overriding or filtering the woodmart_get_products_shortcode() function to sanitize inputs rigorously or by disabling shortcode processing in vulnerable contexts. 2. Implement Web Application Firewall (WAF) rules specifically targeting suspicious shortcode patterns or attempts to exploit this vulnerability. 3. Monitor web server and application logs for unusual shortcode execution attempts or unexpected requests targeting the vulnerable function. 4. Limit exposure by restricting access to the WordPress admin and theme files via IP whitelisting or VPN access where feasible. 5. Keep WordPress core, plugins, and themes updated and subscribe to vendor security advisories for timely patch releases. 6. Conduct security audits and penetration testing focused on shortcode and code injection vectors to identify and remediate similar issues proactively. 7. Educate site administrators about the risks of installing untrusted plugins or themes and encourage the use of security plugins that can detect and block malicious shortcode usage.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-26T18:09:26.679Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 686ce78b6f40f0eb72f2e6c6
Added to database: 7/8/2025, 9:40:27 AM
Last enriched: 7/8/2025, 9:54:32 AM
Last updated: 8/20/2025, 9:49:10 AM
Views: 36
Related Threats
CVE-2025-9237: Cross Site Scripting in CodeAstro Ecommerce Website
MediumCVE-2025-9236: SQL Injection in Portabilis i-Diario
MediumCVE-2025-54551: External control of assumed-Immutable web parameter in FUJIFILM Healthcare Americas Corporation Synapse Mobility
MediumCVE-2025-9235: Cross Site Scripting in Scada-LTS
MediumCVE-2025-9234: Cross Site Scripting in Scada-LTS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.