The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sat, 01 Nov 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WPCOM Member plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.14 via the action parameter in one of its shortcodes. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included. | |
| Title | WPCOM Member <= 1.7.14 - Authenticated (Contributor+) Local File Inclusion via Shortcode | |
| Weaknesses | CWE-98 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-01T01:47:42.358Z
Reserved: 2025-10-17T16:47:34.805Z
Link: CVE-2025-11920
No data.
Status : Received
Published: 2025-11-01T02:15:33.037
Modified: 2025-11-01T02:15:33.037
Link: CVE-2025-11920
No data.
OpenCVE Enrichment
No data.