CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2025-7366 is a critical vulnerability found in the REHub - Price Comparison, Multi Vendor Marketplace WordPress theme developed by sizam. The flaw arises from improper control of code generation (CWE-94), specifically due to the theme's failure to properly validate input before executing the WordPress function do_shortcode. This function processes shortcodes, which are snippets of code embedded in WordPress content to perform dynamic actions. Because the theme allows unauthenticated users to trigger shortcode execution without validation, attackers can inject and execute arbitrary shortcodes remotely. This can lead to unauthorized code execution within the WordPress environment, potentially allowing attackers to manipulate site content, execute malicious PHP code, or perform other unauthorized actions. The vulnerability affects all versions up to and including 19.9.7. The CVSS v3.1 base score is 7.3, indicating a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope remains unchanged (S:U), with low confidentiality, integrity, and availability impacts (C:L/I:L/A:L). Although no public exploits are known at this time, the vulnerability's characteristics make it a prime target for exploitation once weaponized. The theme is widely used in WordPress e-commerce and marketplace sites, increasing the potential attack surface. The vulnerability was published on September 6, 2025, with the initial reservation date on July 8, 2025. No official patches or updates have been linked yet, emphasizing the need for immediate attention from site administrators.
Potential Impact
The vulnerability allows unauthenticated remote attackers to execute arbitrary shortcodes, which can lead to unauthorized code execution within the WordPress environment. This can compromise the confidentiality of sensitive data, integrity of website content, and availability of the affected site. Attackers might leverage this to inject malicious payloads, deface websites, steal user credentials, or pivot to further internal network compromise. Given the theme's use in multi-vendor marketplaces and price comparison sites, exploitation could disrupt e-commerce operations, damage brand reputation, and lead to financial losses. The lack of authentication and user interaction requirements significantly lowers the barrier to exploitation, increasing the risk of widespread attacks. Organizations relying on this theme without mitigation are vulnerable to automated scanning and exploitation attempts, potentially impacting millions of WordPress sites globally.
Mitigation Recommendations
Site administrators should immediately verify if their WordPress installations use the REHub theme up to version 19.9.7 and plan to upgrade to a patched version once available. In the absence of official patches, administrators can mitigate risk by disabling shortcode execution for unauthenticated users via custom code or security plugins that restrict do_shortcode usage. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious shortcode execution attempts can reduce exposure. Regularly monitoring logs for unusual shortcode activity and restricting file permissions to limit code execution capabilities are recommended. Additionally, isolating WordPress instances and enforcing least privilege principles on user roles can limit the impact of a successful exploit. Backup strategies should be reviewed and tested to ensure rapid recovery in case of compromise. Coordinating with theme developers and subscribing to security advisories will help ensure timely patch deployment.
Affected Countries
United States, Germany, United Kingdom, India, Brazil, Canada, Australia, France, Japan, Netherlands, Italy, Spain
CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
Description
The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-7366 is a critical vulnerability found in the REHub - Price Comparison, Multi Vendor Marketplace WordPress theme developed by sizam. The flaw arises from improper control of code generation (CWE-94), specifically due to the theme's failure to properly validate input before executing the WordPress function do_shortcode. This function processes shortcodes, which are snippets of code embedded in WordPress content to perform dynamic actions. Because the theme allows unauthenticated users to trigger shortcode execution without validation, attackers can inject and execute arbitrary shortcodes remotely. This can lead to unauthorized code execution within the WordPress environment, potentially allowing attackers to manipulate site content, execute malicious PHP code, or perform other unauthorized actions. The vulnerability affects all versions up to and including 19.9.7. The CVSS v3.1 base score is 7.3, indicating a high-severity issue with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The scope remains unchanged (S:U), with low confidentiality, integrity, and availability impacts (C:L/I:L/A:L). Although no public exploits are known at this time, the vulnerability's characteristics make it a prime target for exploitation once weaponized. The theme is widely used in WordPress e-commerce and marketplace sites, increasing the potential attack surface. The vulnerability was published on September 6, 2025, with the initial reservation date on July 8, 2025. No official patches or updates have been linked yet, emphasizing the need for immediate attention from site administrators.
Potential Impact
The vulnerability allows unauthenticated remote attackers to execute arbitrary shortcodes, which can lead to unauthorized code execution within the WordPress environment. This can compromise the confidentiality of sensitive data, integrity of website content, and availability of the affected site. Attackers might leverage this to inject malicious payloads, deface websites, steal user credentials, or pivot to further internal network compromise. Given the theme's use in multi-vendor marketplaces and price comparison sites, exploitation could disrupt e-commerce operations, damage brand reputation, and lead to financial losses. The lack of authentication and user interaction requirements significantly lowers the barrier to exploitation, increasing the risk of widespread attacks. Organizations relying on this theme without mitigation are vulnerable to automated scanning and exploitation attempts, potentially impacting millions of WordPress sites globally.
Mitigation Recommendations
Site administrators should immediately verify if their WordPress installations use the REHub theme up to version 19.9.7 and plan to upgrade to a patched version once available. In the absence of official patches, administrators can mitigate risk by disabling shortcode execution for unauthenticated users via custom code or security plugins that restrict do_shortcode usage. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious shortcode execution attempts can reduce exposure. Regularly monitoring logs for unusual shortcode activity and restricting file permissions to limit code execution capabilities are recommended. Additionally, isolating WordPress instances and enforcing least privilege principles on user roles can limit the impact of a successful exploit. Backup strategies should be reviewed and tested to ensure rapid recovery in case of compromise. Coordinating with theme developers and subscribing to security advisories will help ensure timely patch deployment.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-08T18:39:03.086Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb9510535f4a97731d3e15
Added to database: 9/6/2025, 1:57:36 AM
Last enriched: 2/26/2026, 4:07:41 PM
Last updated: 3/25/2026, 6:45:55 AM
Views: 130
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.