Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8625: CWE-321 Use of Hard-coded Cryptographic Key in copypressdev Copypress Rest API

0
Critical
VulnerabilityCVE-2025-8625cvecve-2025-8625cwe-321
Published: Tue Sep 30 2025 (09/30/2025, 03:35:25 UTC)
Source: CVE Database V5
Vendor/Project: copypressdev
Product: Copypress Rest API

Description

The Copypress Rest API plugin for WordPress is vulnerable to Remote Code Execution via copyreap_handle_image() Function in versions 1.1 to 1.2. The plugin falls back to a hard-coded JWT signing key when no secret is defined and does not restrict which file types can be fetched and saved as attachments. As a result, unauthenticated attackers can forge a valid token to gain elevated privileges and upload an arbitrary file (e.g. a PHP script) through the image handler, leading to remote code execution.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:21:53 UTC

Technical Analysis

The Copypress Rest API plugin for WordPress, specifically versions 1.1 and 1.2, contains a critical vulnerability identified as CVE-2025-8625. This vulnerability arises from the plugin's fallback to a hard-coded JWT signing key when no secret key is configured by the administrator. JWT tokens are used for authentication and authorization; thus, the use of a hard-coded key allows unauthenticated attackers to forge valid JWT tokens. The vulnerability is compounded by the copyreap_handle_image() function, which does not enforce adequate restrictions on the types of files that can be fetched and saved as attachments. Consequently, attackers can upload arbitrary files, including executable PHP scripts, by exploiting this function. This leads to remote code execution (RCE) on the server hosting the WordPress site. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely over the network. The CVSS 3.1 base score of 9.8 reflects the vulnerability's critical impact on confidentiality, integrity, and availability. Although no patches have been released yet and no exploits are publicly known, the risk is significant due to the plugin's use in WordPress environments and the severity of the flaw.

Potential Impact

Successful exploitation of CVE-2025-8625 allows attackers to gain elevated privileges on affected WordPress sites without any authentication. This can lead to full system compromise through remote code execution, enabling attackers to execute arbitrary commands, install malware, create backdoors, or pivot within the network. The confidentiality of sensitive data stored on the site or server can be breached, integrity of website content and configurations can be altered, and availability can be disrupted by destructive payloads or denial-of-service conditions. Given WordPress's widespread use globally, this vulnerability poses a significant risk to websites relying on the Copypress Rest API plugin, potentially impacting e-commerce, corporate, and governmental sites. The lack of authentication and user interaction requirements makes automated exploitation feasible, increasing the likelihood of widespread attacks once exploit code becomes available.

Mitigation Recommendations

Until an official patch is released, organizations should immediately disable or uninstall the Copypress Rest API plugin versions 1.1 and 1.2 to eliminate exposure. If disabling the plugin is not feasible, restrict access to the WordPress REST API endpoints related to the plugin using web application firewalls (WAFs) or network access controls to block unauthenticated requests. Administrators should verify that no hard-coded JWT keys are in use and configure strong, unique secrets for JWT signing if the plugin supports it. Implement strict file upload validation and filtering at the web server or application level to prevent uploading executable files such as PHP scripts. Monitor logs for suspicious activity related to JWT token usage and file uploads. Employ intrusion detection systems (IDS) to detect anomalous behavior indicative of exploitation attempts. Finally, maintain regular backups of website data and configurations to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-05T21:49:23.989Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68db52afa473ffe031e447e3

Added to database: 9/30/2025, 3:46:55 AM

Last enriched: 2/26/2026, 5:21:53 PM

Last updated: 3/25/2026, 9:50:53 AM

Views: 146

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses