Description
The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Published: 2025-08-16
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Arbitrary Shortcode Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability in the Paid Membership Plugin allows an unauthenticated user to pass an unsanitized value to a routine that calls do_shortcode without proper validation. This flaw enables the execution of arbitrary shortcodes, which can be leveraged to run malicious code or otherwise alter the behavior of the WordPress site. The weakness is a classic instance of code injection as identified by CWE-94.

Affected Systems

All WordPress installations that use the Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin with a version of 4.16.4 or earlier are affected. Users running any of these plugin versions should review their installation and determine whether the plugin is in use and the extent of its exposure.

Risk and Exploitability

The CVSS v3 score of 6.5 indicates a moderate severity vulnerability. The EPSS score of less than 1% suggests that the likelihood of real‑world exploitation is low, and the issue is not currently listed in the CISA KEV catalog. The flaw can be triggered without authentication, implying the attacker can target the site publicly, likely by crafting a request that invokes the shortcode parser. The impact is confined to the ability to run arbitrary shortcodes, which may lead to code execution, data exfiltration, or other malicious actions depending on the shortcodes the attacker inserts.

Generated by OpenCVE AI on April 21, 2026 at 03:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Paid Membership Plugin to a patched release (e.g., 4.16.5 or later) that eliminates the unsanitized do_shortcode call.
  • If an update cannot be applied immediately, consider disabling or uninstalling the plugin until a fixed version is available to prevent exposure.
  • As a stop‑gap, configure WordPress or the plugin itself to restrict shortcode execution to authenticated users only and audit existing shortcodes for potential malicious content.

Generated by OpenCVE AI on April 21, 2026 at 03:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28807 The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
History

Mon, 18 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 16 Aug 2025 11:30:00 +0000

Type Values Removed Values Added
Description The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
Title Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress <= 4.16.4 - Unauthenticated Arbitrary Shortcode Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:35.493Z

Reserved: 2025-08-11T22:18:38.543Z

Link: CVE-2025-8878

cve-icon Vulnrichment

Updated: 2025-08-18T18:03:55.949Z

cve-icon NVD

Status : Deferred

Published: 2025-08-16T12:15:32.127

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-8878

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:30:26Z

Weaknesses