Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9489: CWE-94 Improper Control of Generation of Code ('Code Injection') in cbutlerjr WP-Members Membership Plugin

0
Medium
VulnerabilityCVE-2025-9489cvecve-2025-9489cwe-94
Published: Tue Sep 09 2025 (09/09/2025, 04:25:55 UTC)
Source: CVE Database V5
Vendor/Project: cbutlerjr
Product: WP-Members Membership Plugin

Description

The The WP-Members Membership Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.5.4.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:58:11 UTC

Technical Analysis

CVE-2025-9489 is a code injection vulnerability classified under CWE-94 found in the WP-Members Membership Plugin for WordPress, developed by cbutlerjr. The flaw exists in all plugin versions up to and including 3.5.4.2, where the plugin improperly validates input before executing the WordPress do_shortcode function. This improper control allows authenticated users with Subscriber-level privileges or higher to inject and execute arbitrary shortcodes within the WordPress environment. Since shortcodes can execute PHP code or trigger other plugin functionalities, this can lead to unauthorized actions such as data manipulation, privilege escalation, or disruption of site functionality. The vulnerability requires an attacker to have at least low-level authenticated access, which is common in many WordPress sites where user registration is open or loosely controlled. The CVSS 3.1 score of 5.0 reflects a medium severity, with network attack vector, high attack complexity, low privileges required, no user interaction, and limited confidentiality, integrity, and availability impacts. No public exploits have been reported yet, but the vulnerability poses a risk to any WordPress site using the affected plugin versions. The lack of available patches at the time of reporting increases the urgency for mitigation.

Potential Impact

The vulnerability allows attackers with low-level authenticated access to execute arbitrary shortcodes, potentially enabling unauthorized code execution within the WordPress environment. This can lead to partial compromise of site integrity, unauthorized data access or modification, and disruption of service availability. While the impact on confidentiality, integrity, and availability is rated as limited, the ability to execute arbitrary shortcodes can be leveraged for further attacks such as privilege escalation or persistent backdoors. Organizations relying on the WP-Members Membership Plugin are at risk of targeted attacks, especially if user registration is open or poorly managed. The medium severity score indicates that while the vulnerability is not trivially exploitable by unauthenticated attackers, it still represents a significant risk to site security and trustworthiness. Failure to address this vulnerability could result in reputational damage, data breaches, or service interruptions.

Mitigation Recommendations

1. Immediately restrict user registration or limit Subscriber-level access to trusted users only, reducing the attack surface. 2. Monitor and audit user activities for suspicious shortcode usage or unexpected content injections. 3. Apply strict input validation and sanitization on any user-generated content or shortcode parameters, if custom development is possible. 4. Disable or remove the WP-Members Membership Plugin if it is not essential to reduce risk exposure. 5. Follow vendor announcements closely and apply official patches or updates as soon as they become available. 6. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious shortcode execution attempts. 7. Implement least privilege principles for user roles and capabilities within WordPress to limit potential exploitation. 8. Regularly back up WordPress sites and test restoration procedures to recover quickly from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-08-26T13:24:23.171Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68c02cbf9b1730b210897da7

Added to database: 9/9/2025, 1:33:51 PM

Last enriched: 2/26/2026, 5:58:11 PM

Last updated: 3/24/2026, 8:07:05 AM

Views: 242

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses