Description
The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Published: 2025-02-22
Score: 7.3 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary Shortcode Execution
Action: Immediate Patch
AI Analysis

Impact

The Custom Post Type Date Archives plugin allows execution of any shortcode supplied by a user without validating the source or ensuring that the user has proper privileges. This flaw is a form of code injection that lets an unauthenticated adversary insert malicious shortcodes which may be processed by WordPress’s `do_shortcode` function, potentially allowing the attacker to run arbitrary code or commands. The resulting breach could compromise the confidentiality, integrity, and availability of the site, and may ultimately provide full control over the web application.

Affected Systems

The vulnerability affects the WordPress plugin Custom Post Type Date Archives, released by keesiemeijer, in all versions up to and including 2.7.1. Administrators running any of these plugin releases should be aware that the plugin’s version does not contain the necessary authorization checks to limit shortcode execution to trusted users.

Risk and Exploitability

With a CVSS score of 7.3 the flaw is considered high severity, yet the EPSS score is listed as less than 1%, indicating a very low probability of exploitation at the moment. The vulnerability is not present in the CISA KEV catalog, which further suggests that there are no widely documented exploits. The attack vector is inferred to be unauthenticated remote, likely via a crafted HTTP request or by embedding a malicious shortcode in a page or post that the plugin parses, because the plugin fails to enforce user permissions before calling `do_shortcode`. While this chain of exploitation is viable, the low EPSS score reflects the relative novelty or low market interest in this particular vector. Nonetheless, the potential impact warrants prompt action to eliminate the risk.

Generated by OpenCVE AI on April 21, 2026 at 22:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Custom Post Type Date Archives to version 2.7.2 or later to apply the vendor’s fix
  • If an upgrade is not immediately possible, deactivate or uninstall the plugin to prevent the vulnerable code from executing
  • As a temporary measure, restrict or disable the use of `do_shortcode` in the theme or use a plugin that sanitizes user‑supplied shortcodes before execution

Generated by OpenCVE AI on April 21, 2026 at 22:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-4450 The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
History

Sat, 22 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 22 Feb 2025 03:30:00 +0000

Type Values Removed Values Added
Description The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Title Custom Post Type Date Archives <= 2.7.1 - Missing Authorization to Unauthenticated Arbitrary Shortcode Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:51.937Z

Reserved: 2025-02-20T19:17:14.506Z

Link: CVE-2025-1510

cve-icon Vulnrichment

Updated: 2025-02-22T15:27:30.436Z

cve-icon NVD

Status : Received

Published: 2025-02-22T04:15:10.040

Modified: 2025-02-22T04:15:10.040

Link: CVE-2025-1510

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:30:06Z

Weaknesses