CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2025-7366 is a high-severity vulnerability affecting the REHub WordPress theme, specifically designed for price comparison and multi-vendor marketplace websites. The vulnerability arises from improper validation of user-supplied input before executing WordPress shortcodes via the do_shortcode function. This flaw falls under CWE-94, which pertains to improper control of code generation, commonly known as code injection. In this case, unauthenticated attackers can exploit the vulnerability by submitting specially crafted input that gets executed as a shortcode, allowing arbitrary shortcode execution without requiring any authentication or user interaction. Since shortcodes in WordPress can execute PHP code or trigger various plugin/theme functionalities, this can lead to unauthorized code execution, potentially compromising the confidentiality, integrity, and availability of the affected website. The vulnerability affects all versions up to and including 19.9.7 of the REHub theme. The CVSS v3.1 score is 7.3, indicating a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of arbitrary code execution make this a significant threat to websites using this theme. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, especially e-commerce platforms, marketplaces, and price comparison websites using the REHub theme, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive customer data, manipulation of pricing or product information, defacement, or complete website takeover. This can result in financial losses, reputational damage, and potential violations of data protection regulations such as GDPR. Given the theme's popularity among multi-vendor marketplaces, attackers could leverage this vulnerability to compromise multiple vendors' data and transactions, amplifying the impact. Additionally, compromised websites could be used as a launchpad for further attacks within the European digital ecosystem, affecting supply chains and customer trust.
Mitigation Recommendations
Immediate mitigation steps include: 1) Temporarily disabling the REHub theme or switching to a default WordPress theme until a patch is available. 2) Restricting access to shortcode execution by implementing web application firewall (WAF) rules that detect and block suspicious shortcode patterns or payloads. 3) Applying strict input validation and sanitization at the web server or application firewall level to prevent malicious shortcode injection. 4) Monitoring web server logs and WordPress activity logs for unusual shortcode execution attempts or anomalies. 5) Keeping WordPress core, plugins, and themes updated and subscribing to vendor security advisories for timely patch releases. 6) Employing principle of least privilege for WordPress user roles to limit potential damage. 7) Conducting regular security audits and penetration testing focused on shortcode and code injection vectors. These measures go beyond generic advice by focusing on immediate containment and proactive detection until an official patch is released.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
Description
The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI-Powered Analysis
Technical Analysis
CVE-2025-7366 is a high-severity vulnerability affecting the REHub WordPress theme, specifically designed for price comparison and multi-vendor marketplace websites. The vulnerability arises from improper validation of user-supplied input before executing WordPress shortcodes via the do_shortcode function. This flaw falls under CWE-94, which pertains to improper control of code generation, commonly known as code injection. In this case, unauthenticated attackers can exploit the vulnerability by submitting specially crafted input that gets executed as a shortcode, allowing arbitrary shortcode execution without requiring any authentication or user interaction. Since shortcodes in WordPress can execute PHP code or trigger various plugin/theme functionalities, this can lead to unauthorized code execution, potentially compromising the confidentiality, integrity, and availability of the affected website. The vulnerability affects all versions up to and including 19.9.7 of the REHub theme. The CVSS v3.1 score is 7.3, indicating a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of arbitrary code execution make this a significant threat to websites using this theme. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, especially e-commerce platforms, marketplaces, and price comparison websites using the REHub theme, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive customer data, manipulation of pricing or product information, defacement, or complete website takeover. This can result in financial losses, reputational damage, and potential violations of data protection regulations such as GDPR. Given the theme's popularity among multi-vendor marketplaces, attackers could leverage this vulnerability to compromise multiple vendors' data and transactions, amplifying the impact. Additionally, compromised websites could be used as a launchpad for further attacks within the European digital ecosystem, affecting supply chains and customer trust.
Mitigation Recommendations
Immediate mitigation steps include: 1) Temporarily disabling the REHub theme or switching to a default WordPress theme until a patch is available. 2) Restricting access to shortcode execution by implementing web application firewall (WAF) rules that detect and block suspicious shortcode patterns or payloads. 3) Applying strict input validation and sanitization at the web server or application firewall level to prevent malicious shortcode injection. 4) Monitoring web server logs and WordPress activity logs for unusual shortcode execution attempts or anomalies. 5) Keeping WordPress core, plugins, and themes updated and subscribing to vendor security advisories for timely patch releases. 6) Employing principle of least privilege for WordPress user roles to limit potential damage. 7) Conducting regular security audits and penetration testing focused on shortcode and code injection vectors. These measures go beyond generic advice by focusing on immediate containment and proactive detection until an official patch is released.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-08T18:39:03.086Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb9510535f4a97731d3e15
Added to database: 9/6/2025, 1:57:36 AM
Last enriched: 9/6/2025, 2:12:34 AM
Last updated: 9/8/2025, 8:02:22 AM
Views: 17
Related Threats
CVE-2025-10090: SQL Injection in Jinher OA
MediumCVE-2025-58782: CWE-502 Deserialization of Untrusted Data in Apache Software Foundation Apache Jackrabbit Core
CriticalCVE-2025-10088: Cross Site Scripting in SourceCodester Time Tracker
MediumCVE-2025-41708: CWE-319 Cleartext Transmission of Sensitive Information in Bender CC612
HighCVE-2025-41682: CWE-522 Insufficiently Protected Credentials in Bender CC612
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.