CVE-2025-15488

| EUVD-2025-209044 MEDIUM
2026-03-26 WPScan GHSA-cph7-rc62-v42q
6.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low

Lifecycle Timeline

4
PoC Detected
Mar 26, 2026 - 15:13 vuln.today
Public exploit code
Analysis Generated
Mar 26, 2026 - 06:30 vuln.today
EUVD ID Assigned
Mar 26, 2026 - 06:30 euvd
EUVD-2025-209044
CVE Published
Mar 26, 2026 - 06:00 nvd
MEDIUM 6.5

Description

The Responsive Plus WordPress plugin before 3.4.3 is vulnerable to arbitrary shortcode execution due to the software allowing unauthenticated users to execute the update_responsive_woo_free_shipping_left_shortcode AJAX action that does not properly validate the content_rech_data parameter before processing it as a shortcode.

Analysis

The Responsive Plus WordPress plugin before version 3.4.3 contains an arbitrary shortcode execution vulnerability that allows unauthenticated attackers to execute malicious shortcodes through the update_responsive_woo_free_shipping_left_shortcode AJAX action. The vulnerability stems from improper validation of the content_rech_data parameter before processing it as a shortcode, effectively enabling remote code execution in the context of the WordPress installation. A public proof-of-concept exploit is available via WPScan, and this vulnerability poses an immediate threat to all unpatched installations of the affected plugin versions.

Technical Context

The vulnerability exists in the WordPress plugin ecosystem, specifically targeting the Responsive Plus plugin (cpe:2.3:a:unknown:responsive_plus:*:*:*:*:*:*:*:*). The root cause is improper input validation on user-supplied data passed to WordPress shortcode processing functions. WordPress shortcodes are a templating mechanism that executes PHP callbacks, and when user input is directly processed as shortcode content without sanitization, attackers can inject malicious shortcode syntax. The vulnerable AJAX action update_responsive_woo_free_shipping_left_shortcode does not implement proper access controls (allowing unauthenticated execution) or input validation (allowing unsanitized shortcode processing), violating fundamental secure coding practices. This represents a classic case of insufficient input validation combined with insecure AJAX action exposure.

Affected Products

The Responsive Plus WordPress plugin in all versions prior to 3.4.3 is vulnerable, as confirmed through the CPE identifier cpe:2.3:a:unknown:responsive_plus:*:*:*:*:*:*:*:*. The vulnerability has been documented and catalogued by WPScan vulnerability tracking at https://wpscan.com/vulnerability/80ce0f88-3065-48c4-a491-b70e067ce4d7/. Any WordPress installation with Responsive Plus version 3.4.2 or earlier is affected and requires immediate attention.

Remediation

Upgrade the Responsive Plus plugin to version 3.4.3 or later immediately through the WordPress plugin management interface or directly from the plugin repository. Verify the upgrade completion by checking the plugin version in the WordPress admin dashboard under Plugins. As a temporary mitigation prior to patching, disable the Responsive Plus plugin entirely and replace its functionality with alternative plugins, or restrict AJAX requests to the vulnerable action through a Web Application Firewall (WAF) rule that blocks requests to update_responsive_woo_free_shipping_left_shortcode from unauthenticated users. After patching, audit WordPress logs and database for signs of exploitation, including suspicious shortcode usage in post content or transients.

Priority Score

53
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +32
POC: +20

Share

CVE-2025-15488 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy