Skip to main content

CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme

High
VulnerabilityCVE-2025-7366cvecve-2025-7366cwe-94
Published: Sat Sep 06 2025 (09/06/2025, 01:45:16 UTC)
Source: CVE Database V5
Vendor/Project: sizam
Product: REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme

Description

The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI-Powered Analysis

AILast updated: 09/06/2025, 02:12:34 UTC

Technical Analysis

CVE-2025-7366 is a high-severity vulnerability affecting the REHub WordPress theme, specifically designed for price comparison and multi-vendor marketplace websites. The vulnerability arises from improper validation of user-supplied input before executing WordPress shortcodes via the do_shortcode function. This flaw falls under CWE-94, which pertains to improper control of code generation, commonly known as code injection. In this case, unauthenticated attackers can exploit the vulnerability by submitting specially crafted input that gets executed as a shortcode, allowing arbitrary shortcode execution without requiring any authentication or user interaction. Since shortcodes in WordPress can execute PHP code or trigger various plugin/theme functionalities, this can lead to unauthorized code execution, potentially compromising the confidentiality, integrity, and availability of the affected website. The vulnerability affects all versions up to and including 19.9.7 of the REHub theme. The CVSS v3.1 score is 7.3, indicating a high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical nature of arbitrary code execution make this a significant threat to websites using this theme. The lack of available patches at the time of publication increases the urgency for mitigation.

Potential Impact

For European organizations, especially e-commerce platforms, marketplaces, and price comparison websites using the REHub theme, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized access to sensitive customer data, manipulation of pricing or product information, defacement, or complete website takeover. This can result in financial losses, reputational damage, and potential violations of data protection regulations such as GDPR. Given the theme's popularity among multi-vendor marketplaces, attackers could leverage this vulnerability to compromise multiple vendors' data and transactions, amplifying the impact. Additionally, compromised websites could be used as a launchpad for further attacks within the European digital ecosystem, affecting supply chains and customer trust.

Mitigation Recommendations

Immediate mitigation steps include: 1) Temporarily disabling the REHub theme or switching to a default WordPress theme until a patch is available. 2) Restricting access to shortcode execution by implementing web application firewall (WAF) rules that detect and block suspicious shortcode patterns or payloads. 3) Applying strict input validation and sanitization at the web server or application firewall level to prevent malicious shortcode injection. 4) Monitoring web server logs and WordPress activity logs for unusual shortcode execution attempts or anomalies. 5) Keeping WordPress core, plugins, and themes updated and subscribing to vendor security advisories for timely patch releases. 6) Employing principle of least privilege for WordPress user roles to limit potential damage. 7) Conducting regular security audits and penetration testing focused on shortcode and code injection vectors. These measures go beyond generic advice by focusing on immediate containment and proactive detection until an official patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-08T18:39:03.086Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb9510535f4a97731d3e15

Added to database: 9/6/2025, 1:57:36 AM

Last enriched: 9/6/2025, 2:12:34 AM

Last updated: 9/8/2025, 8:02:22 AM

Views: 17

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats