CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2025-7366 is a high-severity vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as Code Injection) affecting the REHub WordPress theme, which is designed for price comparison and multi-vendor marketplace websites. This vulnerability exists in all versions up to and including 19.9.7 of the theme. The core issue arises from improper validation of user-supplied input before it is passed to the WordPress function do_shortcode. This function processes shortcodes, which are snippets of code embedded in WordPress content to execute predefined functions. Due to insufficient input validation, unauthenticated attackers can inject and execute arbitrary shortcodes remotely without any authentication or user interaction. This can lead to unauthorized code execution within the context of the WordPress site, potentially allowing attackers to manipulate site content, escalate privileges, or execute malicious payloads. The CVSS 3.1 base score of 7.3 reflects the network exploitable nature of the vulnerability (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts on confidentiality, integrity, and availability (all rated low to medium). Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for websites using this theme, especially given the popularity of WordPress and the REHub theme for e-commerce and marketplace functionalities.
Potential Impact
For European organizations, especially those operating e-commerce platforms or multi-vendor marketplaces using the REHub theme, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized code execution, enabling attackers to deface websites, steal sensitive customer data, manipulate pricing or product information, or deploy malware to site visitors. This could result in financial losses, reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruptions. Given the theme's role in managing multiple vendors and transactions, attackers might also leverage this vulnerability to compromise vendor accounts or inject fraudulent listings, undermining trust in the platform. The lack of authentication and user interaction requirements means attacks can be automated and widespread, increasing the threat surface. Additionally, the impact on availability could disrupt business continuity, affecting revenue streams and customer satisfaction.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the REHub theme to a patched version once released by the vendor. In the absence of an official patch, organizations can implement temporary mitigations such as disabling or restricting shortcode execution capabilities, especially for unauthenticated users. Web application firewalls (WAFs) should be configured to detect and block suspicious shortcode patterns or injection attempts targeting the vulnerable endpoints. Regular security audits and code reviews of custom shortcodes and plugins should be conducted to ensure no additional injection vectors exist. Organizations should also enforce the principle of least privilege on WordPress user roles to limit potential damage from compromised accounts. Monitoring web server logs for unusual shortcode execution patterns and implementing intrusion detection systems can help identify exploitation attempts early. Finally, maintaining regular backups and having an incident response plan tailored to WordPress environments will aid in rapid recovery if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7366: CWE-94 Improper Control of Generation of Code ('Code Injection') in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
Description
The The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 19.9.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
AI-Powered Analysis
Technical Analysis
CVE-2025-7366 is a high-severity vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as Code Injection) affecting the REHub WordPress theme, which is designed for price comparison and multi-vendor marketplace websites. This vulnerability exists in all versions up to and including 19.9.7 of the theme. The core issue arises from improper validation of user-supplied input before it is passed to the WordPress function do_shortcode. This function processes shortcodes, which are snippets of code embedded in WordPress content to execute predefined functions. Due to insufficient input validation, unauthenticated attackers can inject and execute arbitrary shortcodes remotely without any authentication or user interaction. This can lead to unauthorized code execution within the context of the WordPress site, potentially allowing attackers to manipulate site content, escalate privileges, or execute malicious payloads. The CVSS 3.1 base score of 7.3 reflects the network exploitable nature of the vulnerability (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction needed (UI:N), and impacts on confidentiality, integrity, and availability (all rated low to medium). Although no known exploits are currently reported in the wild, the vulnerability's characteristics make it a significant risk for websites using this theme, especially given the popularity of WordPress and the REHub theme for e-commerce and marketplace functionalities.
Potential Impact
For European organizations, especially those operating e-commerce platforms or multi-vendor marketplaces using the REHub theme, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized code execution, enabling attackers to deface websites, steal sensitive customer data, manipulate pricing or product information, or deploy malware to site visitors. This could result in financial losses, reputational damage, regulatory non-compliance (e.g., GDPR violations due to data breaches), and operational disruptions. Given the theme's role in managing multiple vendors and transactions, attackers might also leverage this vulnerability to compromise vendor accounts or inject fraudulent listings, undermining trust in the platform. The lack of authentication and user interaction requirements means attacks can be automated and widespread, increasing the threat surface. Additionally, the impact on availability could disrupt business continuity, affecting revenue streams and customer satisfaction.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize updating the REHub theme to a patched version once released by the vendor. In the absence of an official patch, organizations can implement temporary mitigations such as disabling or restricting shortcode execution capabilities, especially for unauthenticated users. Web application firewalls (WAFs) should be configured to detect and block suspicious shortcode patterns or injection attempts targeting the vulnerable endpoints. Regular security audits and code reviews of custom shortcodes and plugins should be conducted to ensure no additional injection vectors exist. Organizations should also enforce the principle of least privilege on WordPress user roles to limit potential damage from compromised accounts. Monitoring web server logs for unusual shortcode execution patterns and implementing intrusion detection systems can help identify exploitation attempts early. Finally, maintaining regular backups and having an incident response plan tailored to WordPress environments will aid in rapid recovery if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-08T18:39:03.086Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb9510535f4a97731d3e15
Added to database: 9/6/2025, 1:57:36 AM
Last enriched: 9/13/2025, 3:43:39 AM
Last updated: 10/21/2025, 12:11:21 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-10641: CWE-319 Cleartext Transmission of Sensitive Information in EfficientLab WorkExaminer Professional
UnknownCVE-2025-10639: CWE-798 Use of Hard-coded Credentials in EfficientLab WorkExaminer Professional
CriticalCVE-2025-9428: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Zohocorp Analytics Plus
HighCVE-2025-10640: CWE-602 Client-Side Enforcement of Server-Side Security in EfficientLab WorkExaminer Professional
CriticalCVE-2025-7473: CWE-91 XML Injection (aka Blind XPath Injection) in Zohocorp Endpoint Central
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.