Description
Improper Control of Generation of Code ('Code Injection') vulnerability in extremeidea bidorbuy Store Integrator bidorbuystoreintegrator allows Remote Code Inclusion.This issue affects bidorbuy Store Integrator: from n/a through <= 2.12.0.
Published: 2025-08-28
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper control of code generation that permits Remote Code Inclusion. An attacker can inject arbitrary code into the WordPress bidorbuy Store Integrator plugin, leading to full system compromise. This fits the CWE‑94 code generation flaw and would allow an attacker to execute arbitrary commands on the hosting server.

Affected Systems

The vulnerable component is the WordPress bidorbuy Store Integrator plugin developed by extremeidea. Versions from the initial release through and including 2.12.0 are affected. The plugin is typically installed on WordPress sites that use the bidorbuy store integration feature.

Risk and Exploitability

The CVSS score of 9.1 indicates a high severity rating, and the EPSS score of <1% suggests a very low exploitation probability at present, though the vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector is remote, where an attacker submits malicious input via the plugin’s exposed endpoints or configuration interfaces. If the plugin is installed, any user with the ability to manipulate its settings could trigger the code injection, potentially compromising the entire web application and underlying operating system.

Generated by OpenCVE AI on April 30, 2026 at 08:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the bidorbuy Store Integrator plugin to the latest available version that removes the vulnerability.
  • If an update is not immediately available, disable or uninstall the plugin entirely to eliminate the attack surface until a patch can be applied.
  • Apply general input validation and whitelist filtering on any data that is used to generate code, ensuring that only expected, safe values are processed by the plugin.

Generated by OpenCVE AI on April 30, 2026 at 08:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26057 Improper Control of Generation of Code ('Code Injection') vulnerability in extremeidea bidorbuy Store Integrator allows Remote Code Inclusion. This issue affects bidorbuy Store Integrator: from n/a through 2.12.0.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in extremeidea bidorbuy Store Integrator allows Remote Code Inclusion. This issue affects bidorbuy Store Integrator: from n/a through 2.12.0. Improper Control of Generation of Code ('Code Injection') vulnerability in extremeidea bidorbuy Store Integrator bidorbuystoreintegrator allows Remote Code Inclusion.This issue affects bidorbuy Store Integrator: from n/a through <= 2.12.0.
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Thu, 28 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in extremeidea bidorbuy Store Integrator allows Remote Code Inclusion. This issue affects bidorbuy Store Integrator: from n/a through 2.12.0.
Title WordPress bidorbuy Store Integrator plugin <= 2.12.0 - Remote Code Execution (RCE) vulnerability
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:51.217Z

Reserved: 2025-05-15T17:54:35.011Z

Link: CVE-2025-48100

cve-icon Vulnrichment

Updated: 2025-08-28T13:34:54.572Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T13:15:36.830

Modified: 2026-04-23T15:30:48.010

Link: CVE-2025-48100

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:15:32Z

Weaknesses