CVE-2025-1510

7.3 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the Custom Post Type Date Archives plugin. Attackers can potentially run malicious code, inject content, or perform other actions depending on available shortcodes. All WordPress sites using this plugin up to version 2.7.1 are affected.

💻 Affected Systems

Products:
  • WordPress Custom Post Type Date Archives plugin
Versions: All versions up to and including 2.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin active. No authentication required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution if malicious shortcodes are available, leading to complete site compromise, data theft, or malware distribution.

🟠

Likely Case

Content injection, defacement, or privilege escalation through existing shortcode functionality.

🟢

If Mitigated

Limited impact if shortcode functionality is restricted and proper input validation is in place elsewhere.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires knowledge of available shortcodes and their parameters. No authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.7.2 or later

Vendor Advisory: https://wordpress.org/plugins/custom-post-type-date-archives/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Custom Post Type Date Archives'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 2.7.2+ from WordPress.org and replace plugin files.

🔧 Temporary Workarounds

Disable plugin

all

Temporarily deactivate the vulnerable plugin until patched

Restrict access

all

Use web application firewall to block requests to vulnerable endpoints

🧯 If You Can't Patch

  • Disable the Custom Post Type Date Archives plugin immediately
  • Implement strict input validation and output encoding for all user-controlled data

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Custom Post Type Date Archives. If version is 2.7.1 or lower, you are vulnerable.

Check Version:

wp plugin list --name='custom-post-type-date-archives' --field=version

Verify Fix Applied:

Confirm plugin version is 2.7.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress endpoints with shortcode parameters
  • Multiple failed shortcode execution attempts in WordPress debug logs

Network Indicators:

  • HTTP requests containing shortcode syntax to WordPress installation
  • Unusual traffic patterns to date archive pages

SIEM Query:

source="wordpress" AND (shortcode OR do_shortcode) AND status=200

🔗 References

📤 Share & Export