Description
The ORDER POST plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Published: 2025-04-10
Score: 7.3 High
EPSS: 1.4% Low
KEV: No
Impact: Arbitrary Shortcode Execution allowing potential remote code execution within WordPress sites
Action: Immediate Patch
AI Analysis

Impact

The ORDER POST plugin contains a flaw that lets attackers supply unchecked input to the do_shortcode function. This improper validation permits execution of chosen shortcodes without authentication. The vulnerability is identified as a Code Injection weakness (CWE-94). If attackers supply a malicious shortcode that invokes server‑side actions, they can run arbitrary code under the web server’s user privileges, leading to full compromise of the affected WordPress installation.

Affected Systems

WordPress sites using the ORDER POST plugin, specifically all releases up to and including version 2.0.2. Any instance that has not applied the recent update remains vulnerable.

Risk and Exploitability

The CVSS score of 7.3 signals high severity, and the EPSS value of 1% indicates that a measurable portion of the WordPress ecosystem is likely to attempt exploitation. Although the vulnerability is not yet in the CISA KEV catalog, the ability for unauthenticated actors to trigger arbitrary shortcodes is a clear attacker pathway. The most probable attack vector involves an unauthenticated request to a page that includes a shortcode, or exploitation via the plugin’s existing shortcode processing route.

Generated by OpenCVE AI on April 20, 2026 at 23:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ORDER POST plugin to a version newer than 2.0.2, which removes the unchecked shortcode handling.
  • If a patch is unavailable or delays exist, uninstall or deactivate the plugin until an update can be applied to prevent any shortcode execution.
  • Implement site‑wide shortcode restrictions or additional input sanitization, such as using a whitelist of permitted shortcodes or configuring the plugin’s settings to restrict shortcode usage to authenticated users only.

Generated by OpenCVE AI on April 20, 2026 at 23:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10478 The ORDER POST plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
History

Thu, 10 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 10 Apr 2025 07:15:00 +0000

Type Values Removed Values Added
Description The ORDER POST plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.0.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Title ORDER POST <= 2.0.2 - Unauthenticated Arbitrary Shortcode Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:34.832Z

Reserved: 2025-03-25T21:38:18.262Z

Link: CVE-2025-2805

cve-icon Vulnrichment

Updated: 2025-04-10T14:00:11.167Z

cve-icon NVD

Status : Deferred

Published: 2025-04-10T07:15:41.687

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-2805

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T23:30:16Z

Weaknesses