vulnerability
WordPress Plugin: wp-user-avatar: CVE-2025-13642: Improper Control of Generation of Code ('Code Injection')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:S/C:P/I:P/A:N) | Dec 8, 2025 | Dec 9, 2025 | Dec 10, 2025 |
Severity
5
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:N)
Published
Dec 8, 2025
Added
Dec 9, 2025
Modified
Dec 10, 2025
Description
The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile and Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.7 due to insufficient input sanitization on the `type` parameter in the form preview functionality. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes via the `pp_preview_form` endpoint.
Solution
wp-user-avatar-plugin-cve-2025-13642
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.