Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme

0
High
VulnerabilityCVE-2025-7366cvecve-2025-7366cwe-94
Published: Sat Sep 06 2025 (09/06/2025, 01:45:16 UTC)
Source: CVE Database V5
Vendor/Project: sizam
Product: REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme

Description

The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI-Powered Analysis

AILast updated: 09/13/2025, 03:43:39 UTC

Technical Analysis

CVE-2025-7366 is a high-severity vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as Code Injection) affecting the REHub WordPress theme, which is designed for price comparison and multi-vendor marketplace websites. This vulnerability exists in all versions up to and including 19.9.7 of the theme. The core issue arises from improper validation of user-supplied input before it is passed to the WordPress function do_shortcode. This function processes shortcodes, which are snippets of code embedded in WordPress content to execute predefined functions. Due to insufficient input validation, unauthenticated attackers can inject and execute arbitrary shortcodes remotely without any authentication or user interaction. This can lead to unauthorized code execution within the context of the WordPress site, potentially allowing attackers to manipulate site content, escalate privileges, or execute malicious payloads. The CVSS 3.1 base score of 7.3 reflects the network exploitable nature of the vulnerability (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts on confidentiality, integrity, and availability (all rated low to medium). Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for websites using this theme, especially given the popularity of WordPress and the REHub theme for e-commerce and marketplace functionalities.

Potential Impact

For European organizations, especially those operating e-commerce platforms or multi-vendor marketplaces using the REHub theme, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized code execution, enabling attackers to deface websites, steal sensitive customer data, manipulate pricing or product information, or deploy malware to site visitors. This could result in financial losses, reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruptions. Given the theme's role in managing multiple vendors and transactions, attackers might also leverage this vulnerability to compromise vendor accounts or inject fraudulent listings, undermining trust in the platform. The lack of authentication and user interaction requirements means attacks can be automated and widespread, increasing the threat surface. Additionally, the impact on availability could disrupt business continuity, affecting revenue streams and customer satisfaction.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize updating the REHub theme to a patched version once released by the vendor. In the absence of an official patch, organizations can implement temporary mitigations such as disabling or restricting shortcode execution capabilities, especially for unauthenticated users. Web application firewalls (WAFs) should be configured to detect and block suspicious shortcode patterns or injection attempts targeting the vulnerable endpoints. Regular security audits and code reviews of custom shortcodes and plugins should be conducted to ensure no additional injection vectors exist. Organizations should also enforce the principle of least privilege on WordPress user roles to limit potential damage from compromised accounts. Monitoring web server logs for unusual shortcode execution patterns and implementing intrusion detection systems can help identify exploitation attempts early. Finally, maintaining regular backups and having an incident response plan tailored to WordPress environments will aid in rapid recovery if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-08T18:39:03.086Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb9510535f4a97731d3e15

Added to database: 9/6/2025, 1:57:36 AM

Last enriched: 9/13/2025, 3:43:39 AM

Last updated: 10/21/2025, 12:11:21 PM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats