Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7711: CWE-94 Improper Control of Generation of Code ('Code Injection') in techlabpro1 Classified Listing – AI-Powered Classified ads & Business Directory Plugin

0
Medium
VulnerabilityCVE-2025-7711cvecve-2025-7711cwe-94
Published: Mon Nov 17 2025 (11/17/2025, 22:27:44 UTC)
Source: CVE Database V5
Vendor/Project: techlabpro1
Product: Classified Listing – AI-Powered Classified ads & Business Directory Plugin

Description

The The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 5.0.3. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.

AI-Powered Analysis

AILast updated: 11/24/2025, 23:16:29 UTC

Technical Analysis

CVE-2025-7711 is a code injection vulnerability categorized under CWE-94, found in the Classified Listing – AI-Powered Classified ads & Business Directory Plugin for WordPress developed by techlabpro1. The flaw arises because the plugin improperly validates input before executing the WordPress function do_shortcode, which processes shortcodes embedded in content. This improper validation allows authenticated users with Subscriber-level privileges or higher to inject and execute arbitrary shortcodes. Since shortcodes can trigger PHP code execution or invoke other plugin functionalities, this can lead to unauthorized actions within the WordPress site context. The vulnerability affects all versions up to and including 5.0.3. The CVSS 3.1 base score is 5.4 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the level of a logged-in user, but does not require user interaction. The impact primarily affects confidentiality and integrity, with no direct availability impact. No public exploits have been reported yet, but the vulnerability could be leveraged to escalate privileges or manipulate site content. The vulnerability was reserved in July 2025 and published in November 2025, indicating recent discovery and disclosure. The plugin is commonly used for classified ads and business directory functionalities on WordPress sites, which are popular among small and medium enterprises.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to websites using the affected plugin for classified ads or business directories, which are often integral to local commerce and community engagement platforms. Exploitation could allow attackers with minimal privileges to execute arbitrary shortcodes, potentially leading to unauthorized data disclosure, content manipulation, or further privilege escalation within the WordPress environment. This can undermine the confidentiality and integrity of the affected websites, damage brand reputation, and disrupt business operations. Given the widespread use of WordPress in Europe, especially among SMEs and local businesses, the vulnerability could have a broad impact if exploited at scale. However, the requirement for authenticated access limits exposure to external anonymous attackers. The absence of known exploits in the wild reduces immediate risk but does not eliminate it, as attackers may develop exploits following public disclosure. Organizations in sectors relying heavily on online classified ads or business directories, such as real estate, automotive, and local services, may face higher risks.

Mitigation Recommendations

1. Immediately restrict Subscriber-level and higher user permissions to trusted individuals only, minimizing the risk of malicious shortcode injection. 2. Monitor and audit user activities related to shortcode usage and content submission within the WordPress admin dashboard. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode patterns or unauthorized shortcode execution attempts. 4. Disable or limit the use of shortcodes for users with lower privileges if possible, through custom role capabilities or plugin configuration. 5. Regularly check for and apply updates or patches from the plugin vendor as soon as they become available. 6. Employ security plugins that can detect and prevent code injection or unauthorized shortcode execution. 7. Conduct periodic security reviews and penetration testing focusing on WordPress plugins and user privilege management. 8. Educate site administrators and content managers about the risks of shortcode misuse and enforce strict content validation policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-07-16T13:49:21.442Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691ba3aabb922d226272e042

Added to database: 11/17/2025, 10:37:30 PM

Last enriched: 11/24/2025, 11:16:29 PM

Last updated: 1/7/2026, 4:22:52 AM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats