Cyber Posture

CVE-2025-11920

High

Published: 01 November 2025

Published
01 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0013 31.4th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-11920 is a Local File Inclusion vulnerability (CWE-98) affecting the WPCOM Member plugin for WordPress in all versions up to and including 1.7.14. The flaw exists via the 'action' parameter in one of the plugin's shortcodes, which fails to properly validate inputs, allowing the inclusion and execution of arbitrary .php files on the server. Published on 2025-11-01, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for confidentiality, integrity, and availability impacts.

Authenticated attackers with Contributor-level access or higher can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By manipulating the 'action' parameter, they can include arbitrary .php files, execute PHP code within those files, bypass access controls, obtain sensitive data, or achieve remote code execution, particularly if the environment allows uploading .php files that can then be included.

References include code locations in class-member.php at lines 1119, 1171, and 374 in version 1.7.13, a patch changeset 3385562 in the plugin trunk, and a Wordfence threat intelligence advisory, suggesting mitigation through updating to a patched version beyond 1.7.14.

Details

CWE(s)
CWE-98

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

LFI vulnerability in WordPress plugin enables remote authenticated attackers to include and execute arbitrary PHP files on a public-facing web application, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References