Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme

0
Medium
VulnerabilityCVE-2025-8905cvecve-2025-8905cwe-94
Published: Fri Aug 15 2025 (08/15/2025, 08:25:41 UTC)
Source: CVE Database V5
Vendor/Project: inpersttion
Product: Inpersttion For Theme

Description

The Inpersttion For Theme plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0 via the theme_section_shortcode() function. This is due to the plugin not restricting what functions can be called. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server which is limited to arbitrary functions without any user supplied parameters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:33:29 UTC

Technical Analysis

CVE-2025-8905 is a remote code execution (RCE) vulnerability identified in the Inpersttion For Theme WordPress plugin, affecting all versions up to and including 1.0. The vulnerability arises from improper control over code generation (CWE-94) within the theme_section_shortcode() function. Specifically, the plugin does not restrict which functions can be invoked, enabling authenticated attackers with Contributor-level or higher privileges to execute arbitrary functions on the server. Notably, the exploit does not allow user-supplied parameters, limiting the scope of function calls but still enabling significant control over server-side execution. The vulnerability requires authentication but no user interaction, and the attack surface includes any WordPress site using this plugin. The CVSS 3.1 base score is 6.3, reflecting network attack vector, low attack complexity, and privileges required. The impact spans confidentiality, integrity, and availability, as arbitrary code execution can lead to data exposure, modification, or service disruption. No known public exploits or patches exist at the time of publication, increasing the urgency for mitigation. The vulnerability was reserved on August 12, 2025, and published on August 15, 2025, by Wordfence. This flaw highlights the risks of insufficient function call restrictions in plugin code, especially in popular CMS environments like WordPress.

Potential Impact

The vulnerability allows authenticated users with Contributor-level access or higher to execute arbitrary code on the hosting server, which can lead to full compromise of the affected WordPress site. This includes unauthorized data access, modification, deletion, or disruption of service (denial of service). Attackers could leverage this to deploy backdoors, pivot to other internal systems, or deface websites. Since Contributor roles are commonly assigned to trusted users or content creators, the risk of insider threats or compromised accounts is significant. The vulnerability affects all installations of the Inpersttion For Theme plugin up to version 1.0, potentially impacting thousands of WordPress sites globally. The lack of user interaction requirement and low attack complexity increase the likelihood of exploitation once credentials are obtained. Although no public exploits are currently known, the vulnerability’s nature makes it a high-value target for attackers seeking persistent access or lateral movement within compromised environments.

Mitigation Recommendations

1. Immediately restrict Contributor-level access and above to only trusted users until a patch is available. 2. Monitor WordPress logs and server activity for unusual function calls or code execution patterns related to the theme_section_shortcode() function. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious shortcode usage or function invocation attempts. 4. Disable or remove the Inpersttion For Theme plugin if it is not essential to reduce attack surface. 5. Apply the vendor patch promptly once released, and verify the update addresses the function call restriction issue. 6. Enforce strong authentication and credential hygiene to prevent account compromise of users with Contributor or higher privileges. 7. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes. 8. Consider isolating WordPress environments to limit the impact of potential code execution exploits. 9. Educate site administrators and content contributors about the risks of privilege misuse and suspicious activity reporting.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-12T19:54:09.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689ef437ad5a09ad00697375

Added to database: 8/15/2025, 8:47:51 AM

Last enriched: 2/26/2026, 5:33:29 PM

Last updated: 3/24/2026, 7:05:41 PM

Views: 110

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses