CVE-2025-8878

6.5 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to execute arbitrary WordPress shortcodes through the ProfilePress plugin. Attackers can potentially inject malicious code or access restricted content. All WordPress sites using ProfilePress versions up to 4.16.4 are affected.

💻 Affected Systems

Products:
  • ProfilePress (Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content)
Versions: All versions up to and including 4.16.4
Operating Systems: All platforms running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations with ProfilePress plugin enabled are vulnerable by default

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete site compromise, data theft, or malware distribution

🟠

Likely Case

Content injection, privilege escalation, or unauthorized access to restricted content

🟢

If Mitigated

Limited impact if shortcode execution is restricted by other security controls

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Attack requires no authentication and shortcode execution is straightforward

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.16.5 or later

Vendor Advisory: https://wordpress.org/plugins/wp-user-avatar/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find ProfilePress plugin
4. Click 'Update Now' if available
5. Alternatively, download version 4.16.5+ from WordPress.org and manually update

🔧 Temporary Workarounds

Disable ProfilePress Plugin

WordPress

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate wp-user-avatar

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block suspicious shortcode patterns
  • Restrict access to affected endpoints using .htaccess or nginx configuration

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → ProfilePress version number

Check Version:

wp plugin get wp-user-avatar --field=version

Verify Fix Applied:

Verify plugin version is 4.16.5 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual shortcode execution patterns in WordPress debug logs
  • Multiple failed shortcode execution attempts

Network Indicators:

  • POST requests containing unusual shortcode parameters to ProfilePress endpoints

SIEM Query:

source="wordpress.log" AND "do_shortcode" AND ("profilepress" OR "wp-user-avatar")

🔗 References

📤 Share & Export