- Description
- The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 7.3
- Impact score
- 3.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
- Severity
- HIGH
- security@wordfence.com
- CWE-94
- Hype score
- Not currently trending
🚨 CVE-2025-2802 🔴 HIGH (7.3) 🏢 layoutboxx - LayoutBoxx 🏗️ * 🔗 https://t.co/4aKRy96jdz 🔗 https://t.co/SC9tFtoluS 🔗 https://t.co/TsTfAaswER #CyberCron #VulnAlert #InfoSec https://t.co/GGbrdcXcwa
@cybercronai
7 May 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-2802 The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing use… https://t.co/xSkJcJZ2MA
@CVEnew
6 May 2025
440 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes