CVE-2025-7711: CWE-94 Improper Control of Generation of Code ('Code Injection') in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin
The The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
AI Analysis
Technical Summary
CVE-2025-7711 is a code injection vulnerability categorized under CWE-94, found in the Classified Listing – AI-Powered Classified ads & Business Directory Plugin for WordPress developed by techlabpro1. The flaw arises because the plugin improperly validates input before executing the WordPress function do_shortcode, which processes shortcodes embedded in content. This improper validation allows authenticated users with Subscriber-level privileges or higher to inject and execute arbitrary shortcodes. Since shortcodes can trigger PHP code execution or invoke other plugin functionalities, this can lead to unauthorized actions within the WordPress site context. The vulnerability affects all versions up to and including 5.0.3. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of a logged-in user, but does not require user interaction. The impact primarily affects confidentiality and integrity, with no direct availability impact. No public exploits have been reported yet, but the vulnerability could be leveraged to escalate privileges or manipulate site content. The vulnerability was reserved in July 2025 and published in November 2025, indicating recent discovery and disclosure. The plugin is commonly used for classified ads and business directory functionalities on WordPress sites, which are popular among small and medium enterprises.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites using the affected plugin for classified ads or business directories, which are often integral to local commerce and community engagement platforms. Exploitation could allow attackers with minimal privileges to execute arbitrary shortcodes, potentially leading to unauthorized data disclosure, content manipulation, or further privilege escalation within the WordPress environment. This can undermine the confidentiality and integrity of the affected websites, damage brand reputation, and disrupt business operations. Given the widespread use of WordPress in Europe, especially among SMEs and local businesses, the vulnerability could have a broad impact if exploited at scale. However, the requirement for authenticated access limits exposure to external anonymous attackers. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits following public disclosure. Organizations in sectors relying heavily on online classified ads or business directories, such as real estate, automotive, and local services, may face higher risks.
Mitigation Recommendations
1. Immediately restrict Subscriber-level and higher user permissions to trusted individuals only, minimizing the risk of malicious shortcode injection. 2. Monitor and audit user activities related to shortcode usage and content submission within the WordPress admin dashboard. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode patterns or unauthorized shortcode execution attempts. 4. Disable or limit the use of shortcodes for users with lower privileges if possible, through custom role capabilities or plugin configuration. 5. Regularly check for and apply updates or patches from the plugin vendor as soon as they become available. 6. Employ security plugins that can detect and prevent code injection or unauthorized shortcode execution. 7. Conduct periodic security reviews and penetration testing focusing on WordPress plugins and user privilege management. 8. Educate site administrators and content managers about the risks of shortcode misuse and enforce strict content validation policies.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-7711: CWE-94 Improper Control of Generation of Code ('Code Injection') in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin
Description
The The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
AI-Powered Analysis
Technical Analysis
CVE-2025-7711 is a code injection vulnerability categorized under CWE-94, found in the Classified Listing – AI-Powered Classified ads & Business Directory Plugin for WordPress developed by techlabpro1. The flaw arises because the plugin improperly validates input before executing the WordPress function do_shortcode, which processes shortcodes embedded in content. This improper validation allows authenticated users with Subscriber-level privileges or higher to inject and execute arbitrary shortcodes. Since shortcodes can trigger PHP code execution or invoke other plugin functionalities, this can lead to unauthorized actions within the WordPress site context. The vulnerability affects all versions up to and including 5.0.3. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of a logged-in user, but does not require user interaction. The impact primarily affects confidentiality and integrity, with no direct availability impact. No public exploits have been reported yet, but the vulnerability could be leveraged to escalate privileges or manipulate site content. The vulnerability was reserved in July 2025 and published in November 2025, indicating recent discovery and disclosure. The plugin is commonly used for classified ads and business directory functionalities on WordPress sites, which are popular among small and medium enterprises.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to websites using the affected plugin for classified ads or business directories, which are often integral to local commerce and community engagement platforms. Exploitation could allow attackers with minimal privileges to execute arbitrary shortcodes, potentially leading to unauthorized data disclosure, content manipulation, or further privilege escalation within the WordPress environment. This can undermine the confidentiality and integrity of the affected websites, damage brand reputation, and disrupt business operations. Given the widespread use of WordPress in Europe, especially among SMEs and local businesses, the vulnerability could have a broad impact if exploited at scale. However, the requirement for authenticated access limits exposure to external anonymous attackers. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits following public disclosure. Organizations in sectors relying heavily on online classified ads or business directories, such as real estate, automotive, and local services, may face higher risks.
Mitigation Recommendations
1. Immediately restrict Subscriber-level and higher user permissions to trusted individuals only, minimizing the risk of malicious shortcode injection. 2. Monitor and audit user activities related to shortcode usage and content submission within the WordPress admin dashboard. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode patterns or unauthorized shortcode execution attempts. 4. Disable or limit the use of shortcodes for users with lower privileges if possible, through custom role capabilities or plugin configuration. 5. Regularly check for and apply updates or patches from the plugin vendor as soon as they become available. 6. Employ security plugins that can detect and prevent code injection or unauthorized shortcode execution. 7. Conduct periodic security reviews and penetration testing focusing on WordPress plugins and user privilege management. 8. Educate site administrators and content managers about the risks of shortcode misuse and enforce strict content validation policies.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-16T13:49:21.442Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691ba3aabb922d226272e042
Added to database: 11/17/2025, 10:37:30 PM
Last enriched: 11/24/2025, 11:16:29 PM
Last updated: 1/7/2026, 4:54:26 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.