CVE Alert: CVE-2025-11920 – whyun – WPCOM Member

CVE-2025-11920

HIGHNo exploitation known

The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

CVSS v3.1 (8.8)
Vendor
whyun
Product
WPCOM Member
Versions
* lte 1.7.14
CWE
CWE-98, CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program (‘PHP Remote File Inclusion’)
Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Published
2025-11-01T01:47:41.378Z
Updated
2025-11-01T01:47:42.358Z

AI Summary Analysis

Risk verdict

High. Exploitation is possible by authenticated users with contributor-level access, potentially enabling remote code execution; patching should be treated as urgent.

Why this matters

If exploited, the attacker can execute PHP on the server, bypassing some access controls and exposing or altering data, compromising site integrity. The impact spans data loss, downtime, and reputational damage, with possible persistence or broader access within the hosting environment.

Most likely attack path

An authenticated attacker (Contributor+) uses the vulnerable shortcode’s action parameter to trigger a local file inclusion, loading arbitrary PHP. No user interaction beyond the existing login is required; once code runs, sensitive data may be read or modified and a backdoor could be installed, potentially enabling lateral movement within the web server environment.

Who is most exposed

WordPress sites running the WPCOM Member plugin, especially where contributors can insert shortcodes and PHP execution is possible from included files (common in shared or managed WordPress hosting with flexible plugin usage).

Detection ideas

  • Monitor shortcode processing for action parameters that attempt to include PHP files.
  • Look for PHP include/require errors originating from plugin paths.
  • Detect sudden creation or execution of PHP files under wp-content.
  • Alert on spikes in 500 errors after shortcode rendering.
  • Review access logs for requests exploiting shortcode-based inclusion patterns.

Mitigation and prioritisation

  • Patch to the fixed release or temporarily disable the plugin; implement change control.
  • Enforce least privilege for Contributor+ accounts and restrict shortcode capabilities.
  • Deploy WAF/IPS rules to block LFI-like patterns; harden PHP execution controls.
  • Tighten file permissions and upload restrictions; disable arbitrary PHP uploads.
  • Ensure backups, incident response readiness, and post-patch validation.

Support Our Work

A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on Patreon or Buy Me A Coffee using the buttons below.

AI APIs OSINT driven New features