CVE-2025-7711: CWE-94 Improper Control of Generation of Code ('Code Injection') in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin
The The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2025-7711 is a code injection vulnerability classified under CWE-94 found in the Classified Listing – AI-Powered Classified ads & Business Directory Plugin for WordPress, maintained by techlabpro1. The flaw exists in all plugin versions up to and including 5.0.3, where the plugin improperly validates input before executing WordPress shortcodes via the do_shortcode function. Specifically, authenticated users with Subscriber-level privileges or above can supply crafted input that the plugin processes without sufficient sanitization or validation, enabling arbitrary shortcode execution. This can allow attackers to execute unintended code paths within the WordPress environment, potentially leading to unauthorized data access or modification. The vulnerability does not require user interaction and can be exploited remotely over the network with low complexity. However, it requires at least Subscriber-level authentication, which is a relatively low privilege level in WordPress, making exploitation feasible in many scenarios where user registration is open or compromised accounts exist. The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impacts but no availability impact. No public exploits or active exploitation have been reported as of the publication date. The vulnerability highlights the risks of improper input validation in WordPress plugins that handle shortcode execution, a common attack vector in the WordPress ecosystem.
Potential Impact
The primary impact of CVE-2025-7711 is on confidentiality and integrity within affected WordPress sites using the Classified Listing plugin. An attacker with Subscriber-level access can execute arbitrary shortcodes, potentially allowing them to run malicious code snippets or access sensitive data exposed via shortcode functionality. While this does not directly lead to full system compromise or denial of service, it can facilitate further attacks such as privilege escalation, data leakage, or unauthorized content manipulation. Organizations relying on this plugin for classified ads or business directories may face reputational damage, data breaches, or unauthorized content changes. The vulnerability is particularly concerning for sites that allow open user registration or have weak authentication controls, increasing the likelihood of attacker access at the Subscriber level. Since WordPress powers a significant portion of websites globally, the scope of affected systems is broad, especially among small to medium businesses and community platforms using this plugin. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-7711, organizations should immediately update the Classified Listing plugin to a patched version once available from the vendor. In the absence of a patch, administrators should restrict Subscriber-level user capabilities to prevent shortcode submission or execution, possibly by customizing user roles or employing security plugins that limit shortcode usage. Implementing strict input validation and sanitization on any user-submitted content that may be processed by do_shortcode is critical. Monitoring logs for unusual shortcode execution or unexpected content changes can help detect exploitation attempts. Additionally, enforcing strong authentication mechanisms, such as multi-factor authentication and limiting user registrations, reduces the risk of attacker access at Subscriber level. Regular security audits of WordPress plugins and adherence to the principle of least privilege for user roles will further reduce exposure. Finally, consider isolating critical WordPress instances or using web application firewalls (WAFs) that can detect and block suspicious shortcode execution patterns.
Affected Countries
United States, India, Brazil, Germany, United Kingdom, Canada, Australia, France, Netherlands, Japan, South Africa
CVE-2025-7711: CWE-94 Improper Control of Generation of Code ('Code Injection') in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin
Description
The The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-7711 is a code injection vulnerability classified under CWE-94 found in the Classified Listing – AI-Powered Classified ads & Business Directory Plugin for WordPress, maintained by techlabpro1. The flaw exists in all plugin versions up to and including 5.0.3, where the plugin improperly validates input before executing WordPress shortcodes via the do_shortcode function. Specifically, authenticated users with Subscriber-level privileges or above can supply crafted input that the plugin processes without sufficient sanitization or validation, enabling arbitrary shortcode execution. This can allow attackers to execute unintended code paths within the WordPress environment, potentially leading to unauthorized data access or modification. The vulnerability does not require user interaction and can be exploited remotely over the network with low complexity. However, it requires at least Subscriber-level authentication, which is a relatively low privilege level in WordPress, making exploitation feasible in many scenarios where user registration is open or compromised accounts exist. The CVSS v3.1 base score is 5.4, reflecting limited confidentiality and integrity impacts but no availability impact. No public exploits or active exploitation have been reported as of the publication date. The vulnerability highlights the risks of improper input validation in WordPress plugins that handle shortcode execution, a common attack vector in the WordPress ecosystem.
Potential Impact
The primary impact of CVE-2025-7711 is on confidentiality and integrity within affected WordPress sites using the Classified Listing plugin. An attacker with Subscriber-level access can execute arbitrary shortcodes, potentially allowing them to run malicious code snippets or access sensitive data exposed via shortcode functionality. While this does not directly lead to full system compromise or denial of service, it can facilitate further attacks such as privilege escalation, data leakage, or unauthorized content manipulation. Organizations relying on this plugin for classified ads or business directories may face reputational damage, data breaches, or unauthorized content changes. The vulnerability is particularly concerning for sites that allow open user registration or have weak authentication controls, increasing the likelihood of attacker access at the Subscriber level. Since WordPress powers a significant portion of websites globally, the scope of affected systems is broad, especially among small to medium businesses and community platforms using this plugin. The absence of known exploits reduces immediate risk but does not eliminate the threat of future exploitation.
Mitigation Recommendations
To mitigate CVE-2025-7711, organizations should immediately update the Classified Listing plugin to a patched version once available from the vendor. In the absence of a patch, administrators should restrict Subscriber-level user capabilities to prevent shortcode submission or execution, possibly by customizing user roles or employing security plugins that limit shortcode usage. Implementing strict input validation and sanitization on any user-submitted content that may be processed by do_shortcode is critical. Monitoring logs for unusual shortcode execution or unexpected content changes can help detect exploitation attempts. Additionally, enforcing strong authentication mechanisms, such as multi-factor authentication and limiting user registrations, reduces the risk of attacker access at Subscriber level. Regular security audits of WordPress plugins and adherence to the principle of least privilege for user roles will further reduce exposure. Finally, consider isolating critical WordPress instances or using web application firewalls (WAFs) that can detect and block suspicious shortcode execution patterns.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-16T13:49:21.442Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ba3aabb922d226272e042
Added to database: 11/17/2025, 10:37:30 PM
Last enriched: 2/26/2026, 4:31:27 PM
Last updated: 3/21/2026, 11:02:28 PM
Views: 96
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.