- Description
- The ORDER POST plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
- Source
- security@wordfence.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 7.3
- Impact score
- 3.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
- Severity
- HIGH
- security@wordfence.com
- CWE-94
- Hype score
- Not currently trending
🚨 CVE-2025-2805 🔴 HIGH (7.3) 🏢 vikashsrivastava1111989 - ORDER POST 🏗️ * 🔗 https://t.co/DGiyexDDTi 🔗 https://t.co/J4POdezJaE 🔗 https://t.co/gKbNBWUUVP #CyberCron #VulnAlert #InfoSec https://t.co/BaMa6OSz7x
@cybercronai
10 Apr 2025
16 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CVE-2025-2805 — Critical WordPress plugin flaw The ORDER POST plugin (≤ v2.0.2) allows unauthenticated attackers to execute arbitrary shortcodes via unvalidated input - potentially leading to remote code execution. ➡️ Check for exposed assets with Modat Magnify: Free: ht
@modat_magnify
10 Apr 2025
58 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
�� CVE-2025-2805 - WordPress - HIGH 🚨 🗓️ Date published 2025-04-10 07:15:41 UTC #WordPress #CyberSecurity #InfoSec #Vulnerability #TechNews https://t.co/rIoCnrhDQy
@vulns_space
10 Apr 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes