Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7825: CWE-96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') in wpt00ls Schema Plugin For Divi, Gutenberg & Shortcodes

0
Medium
VulnerabilityCVE-2025-7825cvecve-2025-7825cwe-96
Published: Fri Oct 03 2025 (10/03/2025, 11:17:21 UTC)
Source: CVE Database V5
Vendor/Project: wpt00ls
Product: Schema Plugin For Divi, Gutenberg & Shortcodes

Description

The Schema Plugin For Divi, Gutenberg & Shortcodes plugin for WordPress is vulnerable to Object Instantiation in all versions up to, and including, 4.3.2 via deserialization of untrusted input via the wpt_schema_breadcrumbs shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.

AI-Powered Analysis

AILast updated: 10/03/2025, 11:33:08 UTC

Technical Analysis

CVE-2025-7825 is a medium-severity vulnerability affecting the Schema Plugin For Divi, Gutenberg & Shortcodes, a WordPress plugin developed by wpt00ls. The vulnerability arises from improper neutralization of directives in statically saved code, classified under CWE-96, which relates to static code injection. Specifically, the flaw is an object instantiation vulnerability via deserialization of untrusted input through the wpt_schema_breadcrumbs shortcode. This allows authenticated users with Contributor-level access or higher to inject a PHP object into the plugin's processing flow. However, the vulnerability alone does not lead to direct exploitation because no gadget or POP (Property Oriented Programming) chain is present within the plugin itself. A POP chain is necessary to leverage the deserialized object for malicious actions such as arbitrary code execution or file manipulation. If the target WordPress installation includes other plugins or themes that contain such POP chains, an attacker could chain this vulnerability with those to perform critical actions like deleting arbitrary files, retrieving sensitive data, or executing arbitrary code. The vulnerability has a CVSS 3.1 base score of 6.3, reflecting medium severity, with attack vector as network, low attack complexity, requiring privileges (Contributor or higher), no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits are currently observed in the wild. The vulnerability affects all versions up to and including 4.3.2 of the plugin. No official patches or updates are currently linked, so mitigation relies on other controls or plugin updates when available.

Potential Impact

For European organizations using WordPress sites with the vulnerable Schema Plugin For Divi, Gutenberg & Shortcodes, this vulnerability poses a moderate risk. The requirement for authenticated Contributor-level access limits exposure to insider threats or compromised accounts rather than anonymous attackers. However, many organizations allow multiple contributors or editors to manage content, increasing the attack surface. If the environment includes other plugins or themes that contain exploitable POP chains, the impact escalates significantly, potentially allowing attackers to execute arbitrary code, delete files, or exfiltrate sensitive data. This could lead to website defacement, data breaches, service disruption, or further lateral movement within the hosting infrastructure. Given the widespread use of WordPress in Europe for business, government, and e-commerce websites, exploitation could affect data confidentiality, integrity, and availability, damaging reputation and compliance posture under GDPR and other regulations. The lack of known exploits in the wild suggests limited active targeting currently, but the medium CVSS score and the possibility of chained exploitation warrant proactive attention.

Mitigation Recommendations

1. Immediately review and restrict Contributor-level and higher privileges to trusted users only, minimizing the number of accounts that can exploit this vulnerability. 2. Monitor and audit user activity on WordPress sites to detect suspicious behavior indicative of exploitation attempts. 3. Temporarily disable or remove the wpt_schema_breadcrumbs shortcode usage if feasible until a patch is available. 4. Conduct an inventory of all installed plugins and themes to identify any that contain POP chains or are known to be vulnerable to deserialization attacks; consider disabling or updating them. 5. Apply the principle of least privilege on the hosting environment and file system permissions to limit the impact of any successful exploit. 6. Keep WordPress core, plugins, and themes updated regularly and watch for official patches from wpt00ls addressing this vulnerability. 7. Employ Web Application Firewalls (WAFs) with rules to detect and block suspicious deserialization payloads or unusual shortcode usage patterns. 8. Implement strong authentication mechanisms such as multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. 9. Regularly backup website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T17:48:11.499Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dfb275c3835a5fbe033bfc

Added to database: 10/3/2025, 11:24:37 AM

Last enriched: 10/3/2025, 11:33:08 AM

Last updated: 10/7/2025, 12:00:27 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats