Description
Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post pdf2post allows Remote Code Inclusion.This issue affects PDF 2 Post: from n/a through <= 2.4.0.
Published: 2025-04-17
Score: 9.9 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper Control of Generation of Code, also known as Code Injection, allows an attacker to cause the PDF 2 Post plugin to execute arbitrary PHP code. The vulnerability is a classic CWE‑94 flaw where user-supplied input is used to generate code that is later evaluated. Successful exploitation would give the attacker full control over the WordPress installation, enabling data exfiltration, site defacement, or installation of additional malware. The vulnerability presents a high impact on confidentiality, integrity, and availability for any site running the plugin.

Affected Systems

The affected vendor is termel, product PDF 2 Post, version 2.4.0 or earlier. The advisory notes that all releases from the earliest known through <=2.4.0 are vulnerable. No explicit version beyond 2.4.0 is mentioned as affected, implying that versions newer than 2.4.0 are either patched or not yet evaluated.

Risk and Exploitability

The CVSS score of 9.9 reflects a catastrophic level of risk, while the EPSS of <1% indicates that the exploitation probability is low at the moment of analysis. The vulnerability is not yet listed in the CISA KEV catalogue. Attackers would most likely target the plugin via crafted HTTP requests or automated code injection attempts aimed at endpoints that accept user input for PDF generation. The lack of access control or input validation around these endpoints is the root cause.

Generated by OpenCVE AI on April 30, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the PDF 2 Post plugin to the latest available version that contains the RCE fix.
  • If an upgrade is not immediately possible, disable or delete the PDF 2 Post plugin to eliminate the vulnerable code path.
  • After remediation, monitor WordPress logs for anomalous code execution or file upload activity to ensure no residual attack vectors remain.

Generated by OpenCVE AI on April 30, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11691 Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post: from n/a through 2.4.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post: from n/a through 2.4.0. Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post pdf2post allows Remote Code Inclusion.This issue affects PDF 2 Post: from n/a through <= 2.4.0.
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Thu, 17 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 17 Apr 2025 16:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in termel PDF 2 Post allows Remote Code Inclusion. This issue affects PDF 2 Post: from n/a through 2.4.0.
Title WordPress PDF 2 Post Plugin <= 2.4.0 - Remote Code Execution (RCE) vulnerability
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:24.837Z

Reserved: 2025-04-09T11:20:15.875Z

Link: CVE-2025-32583

cve-icon Vulnrichment

Updated: 2025-04-17T17:41:14.173Z

cve-icon NVD

Status : Deferred

Published: 2025-04-17T16:15:44.967

Modified: 2026-04-23T15:29:09.257

Link: CVE-2025-32583

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T22:00:08Z

Weaknesses