Skip to main content

CVE-2025-9321: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpsight WPCasa

Critical
VulnerabilityCVE-2025-9321cvecve-2025-9321cwe-94
Published: Tue Sep 23 2025 (09/23/2025, 04:26:13 UTC)
Source: CVE Database V5
Vendor/Project: wpsight
Product: WPCasa

Description

The WPCasa plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.4.1. This is due to insufficient input validation and restriction on the 'api_requests' function. This makes it possible for unauthenticated attackers to call arbitrary functions and execute code.

AI-Powered Analysis

AILast updated: 09/23/2025, 04:36:29 UTC

Technical Analysis

CVE-2025-9321 is a critical security vulnerability affecting the WPCasa plugin for WordPress, developed by wpsight. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This flaw exists in all versions up to and including 1.4.1 of the plugin. The root cause is insufficient input validation and lack of restriction in the 'api_requests' function, which allows unauthenticated attackers to invoke arbitrary functions and execute arbitrary code on the affected system. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely by attackers to gain full control over the WordPress site running the vulnerable plugin. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability that could lead to complete site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.

Potential Impact

For European organizations using WordPress sites with the WPCasa plugin, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, violating GDPR and other data protection regulations. The ability to execute arbitrary code could result in website defacement, disruption of business operations, or the deployment of malware such as ransomware or cryptominers. This could damage brand reputation, lead to financial losses, and trigger regulatory fines. Since WordPress is widely used across Europe for business and real estate websites (the primary use case for WPCasa), the potential impact spans multiple sectors including real estate, hospitality, and small to medium enterprises. The vulnerability's unauthenticated nature means attackers can scan and exploit vulnerable sites en masse, increasing the risk of widespread compromise.

Mitigation Recommendations

Immediate mitigation steps include disabling the WPCasa plugin until a patch is released. Organizations should monitor official wpsight channels for security updates and apply patches promptly once available. In the interim, implementing Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting the 'api_requests' function can reduce exposure. Conduct thorough audits of WordPress installations to identify vulnerable versions of WPCasa and remove or replace them if patching is not feasible. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can also reduce attack surface. Regular backups of the website and databases should be maintained to enable recovery in case of compromise. Additionally, monitoring logs for unusual activity related to API calls can help detect exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-21T18:07:39.969Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d223009de83c5ed4d8df56

Added to database: 9/23/2025, 4:33:04 AM

Last enriched: 9/23/2025, 4:36:29 AM

Last updated: 9/23/2025, 1:51:48 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats