CVE-2025-9321: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpsight WPCasa
The WPCasa plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.4.1. This is due to insufficient input validation and restriction on the 'api_requests' function. This makes it possible for unauthenticated attackers to call arbitrary functions and execute code.
AI Analysis
Technical Summary
CVE-2025-9321 is a critical security vulnerability affecting the WPCasa plugin for WordPress, developed by wpsight. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This flaw exists in all versions up to and including 1.4.1 of the plugin. The root cause is insufficient input validation and lack of restriction in the 'api_requests' function, which allows unauthenticated attackers to invoke arbitrary functions and execute arbitrary code on the affected system. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely by attackers to gain full control over the WordPress site running the vulnerable plugin. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability that could lead to complete site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
For European organizations using WordPress sites with the WPCasa plugin, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, violating GDPR and other data protection regulations. The ability to execute arbitrary code could result in website defacement, disruption of business operations, or the deployment of malware such as ransomware or cryptominers. This could damage brand reputation, lead to financial losses, and trigger regulatory fines. Since WordPress is widely used across Europe for business and real estate websites (the primary use case for WPCasa), the potential impact spans multiple sectors including real estate, hospitality, and small to medium enterprises. The vulnerability's unauthenticated nature means attackers can scan and exploit vulnerable sites en masse, increasing the risk of widespread compromise.
Mitigation Recommendations
Immediate mitigation steps include disabling the WPCasa plugin until a patch is released. Organizations should monitor official wpsight channels for security updates and apply patches promptly once available. In the interim, implementing Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting the 'api_requests' function can reduce exposure. Conduct thorough audits of WordPress installations to identify vulnerable versions of WPCasa and remove or replace them if patching is not feasible. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can also reduce attack surface. Regular backups of the website and databases should be maintained to enable recovery in case of compromise. Additionally, monitoring logs for unusual activity related to API calls can help detect exploitation attempts early.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-9321: CWE-94 Improper Control of Generation of Code ('Code Injection') in wpsight WPCasa
Description
The WPCasa plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.4.1. This is due to insufficient input validation and restriction on the 'api_requests' function. This makes it possible for unauthenticated attackers to call arbitrary functions and execute code.
AI-Powered Analysis
Technical Analysis
CVE-2025-9321 is a critical security vulnerability affecting the WPCasa plugin for WordPress, developed by wpsight. The vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. This flaw exists in all versions up to and including 1.4.1 of the plugin. The root cause is insufficient input validation and lack of restriction in the 'api_requests' function, which allows unauthenticated attackers to invoke arbitrary functions and execute arbitrary code on the affected system. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely by attackers to gain full control over the WordPress site running the vulnerable plugin. The CVSS v3.1 score is 9.8, indicating a critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the ease of exploitation and severity make this a high-risk vulnerability that could lead to complete site compromise, data theft, defacement, or use of the server as a pivot point for further attacks.
Potential Impact
For European organizations using WordPress sites with the WPCasa plugin, this vulnerability poses a significant risk. Exploitation could lead to unauthorized access to sensitive customer data, including personal and financial information, violating GDPR and other data protection regulations. The ability to execute arbitrary code could result in website defacement, disruption of business operations, or the deployment of malware such as ransomware or cryptominers. This could damage brand reputation, lead to financial losses, and trigger regulatory fines. Since WordPress is widely used across Europe for business and real estate websites (the primary use case for WPCasa), the potential impact spans multiple sectors including real estate, hospitality, and small to medium enterprises. The vulnerability's unauthenticated nature means attackers can scan and exploit vulnerable sites en masse, increasing the risk of widespread compromise.
Mitigation Recommendations
Immediate mitigation steps include disabling the WPCasa plugin until a patch is released. Organizations should monitor official wpsight channels for security updates and apply patches promptly once available. In the interim, implementing Web Application Firewalls (WAFs) with custom rules to block suspicious requests targeting the 'api_requests' function can reduce exposure. Conduct thorough audits of WordPress installations to identify vulnerable versions of WPCasa and remove or replace them if patching is not feasible. Restricting access to the WordPress admin and plugin endpoints via IP whitelisting or VPN can also reduce attack surface. Regular backups of the website and databases should be maintained to enable recovery in case of compromise. Additionally, monitoring logs for unusual activity related to API calls can help detect exploitation attempts early.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-21T18:07:39.969Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d223009de83c5ed4d8df56
Added to database: 9/23/2025, 4:33:04 AM
Last enriched: 9/23/2025, 4:36:29 AM
Last updated: 9/23/2025, 1:51:48 PM
Views: 12
Related Threats
CVE-2025-10837: Cross Site Scripting in code-projects Simple Food Ordering System
MediumCVE-2025-6921: CWE-400 Uncontrolled Resource Consumption in huggingface huggingface/transformers
MediumCVE-2025-8354: CWE-843 Type Confusion in Autodesk Revit
HighCVE-2025-9844: CWE-427 Uncontrolled Search Path Element in Salesforce Salesforce CLI
UnknownCVE-2025-10184: CWE-862 Missing Authorization in OnePlus OxygenOS
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.