HIGHCVE-2025-2803CVSS 7.3

Zo Genoemde Aanhalingstekens (Air Quotes) <= 0.1 - Niet-geauthenticeerde Willekeurige Shortcode Uitvoering

Platform

wordpress

Component

so-called-air-quotes

Opgelost in

0.1.1

AI Confidence: highNVDEPSS 1.4%Beoordeeld: mei 2026
Wordt vertaald naar uw taal…

CVE-2025-2803 is a vulnerability affecting the So-Called Air Quotes WordPress plugin, allowing for arbitrary shortcode execution. This vulnerability enables unauthenticated attackers to execute malicious shortcodes, potentially leading to website defacement, data theft, or even remote code execution. Versions 0.0.0 through 0.1 are affected. A patch is expected from the plugin developer.

WordPress

Detecteer deze CVE in je project

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.

Impact en Aanvalsscenarioswordt vertaald…

The arbitrary shortcode execution vulnerability in So-Called Air Quotes poses a significant risk to WordPress websites using this plugin. Attackers can leverage this flaw to inject malicious shortcodes into the site, triggering unintended actions or displaying harmful content. This could range from simple defacement to more severe consequences like stealing sensitive user data or gaining control over the server. The lack of authentication required for exploitation expands the attack surface considerably, making it accessible to a wide range of threat actors. Similar vulnerabilities in other WordPress plugins have been exploited to deliver malware and redirect users to phishing sites.

Uitbuitingscontextwordt vertaald…

CVE-2025-2803 has been publicly disclosed. No Proof-of-Concept (PoC) code has been publicly released as of the publication date, but the vulnerability's nature makes it likely that one will emerge. The EPSS score is currently pending evaluation, but the ease of exploitation suggests a potential for medium to high probability of exploitation. This vulnerability is not currently listed on the CISA KEV catalog.

Wie Loopt Risicowordt vertaald…

Websites utilizing the So-Called Air Quotes plugin, particularly those with limited security configurations or shared hosting environments, are at increased risk. Sites with outdated WordPress installations or those lacking robust WAF protection are also more vulnerable.

Detectiestappenwordt vertaald…

• wordpress / composer / npm:

grep -r 'do_shortcode' /var/www/html/wp-content/plugins/so-called-air-quotes/

• wordpress / composer / npm:

wp plugin list --status=inactive | grep 'so-called-air-quotes'

• generic web: Check WordPress plugin directory for updates and security advisories related to 'So-Called Air Quotes'. • wordpress / composer / npm: Review WordPress access logs for unusual shortcode patterns or requests originating from unexpected IP addresses.

Aanvalstijdlijn

  1. Disclosure

    disclosure

Dreigingsinformatie

Exploit Status

Proof of ConceptOnbekend
CISA KEVNO
InternetblootstellingHoog

EPSS

1.35% (80% percentiel)

CISA SSVC

Exploitatienone
Automatiseerbaaryes
Technische Impactpartial

CVSS-vector

DREIGINGSINFORMATIE· CVSS 3.1CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L7.3HIGHAttack VectorNetworkHoe de aanvaller het doel bereiktAttack ComplexityLowVereiste omstandigheden om te exploiterenPrivileges RequiredNoneVereist authenticatieniveau voor aanvalUser InteractionNoneOf het slachtoffer actie moet ondernemenScopeUnchangedImpact buiten het getroffen onderdeelConfidentialityLowRisico op blootstelling van gevoelige dataIntegrityLowRisico op ongeautoriseerde gegevenswijzigingAvailabilityLowRisico op verstoring van dienstennextguardhq.com · CVSS v3.1 Basisscore
Wat betekenen deze metrics?
Attack Vector
Netwerk — op afstand uitbuitbaar via internet. Geen fysieke of lokale toegang vereist.
Attack Complexity
Laag — geen speciale voorwaarden vereist. Betrouwbaar uitbuitbaar.
Privileges Required
Geen — geen authenticatie vereist om te exploiteren.
User Interaction
Geen — automatische en stille aanval. Slachtoffer doet niets.
Scope
Ongewijzigd — impact beperkt tot het kwetsbare component.
Confidentiality
Laag — gedeeltelijke toegang tot enkele gegevens.
Integrity
Laag — aanvaller kan enkele gegevens met beperkte omvang aanpassen.
Availability
Laag — gedeeltelijke of intermitterende denial of service.

Getroffen Software

Componentso-called-air-quotes
Leverancierdavemacd
Getroffen bereikOpgelost in
0 – 0.10.1.1

Zwakheidsclassificatie (CWE)

Tijdlijn

  1. Gereserveerd
  2. Gepubliceerd
  3. Gewijzigd
  4. EPSS bijgewerkt
Geen patch — 421 dagen na openbaarmaking

Mitigatie en Workaroundswordt vertaald…

The primary mitigation for CVE-2025-2803 is to upgrade to a patched version of the So-Called Air Quotes plugin as soon as it becomes available. Until then, consider implementing temporary workarounds. A Web Application Firewall (WAF) can be configured to block requests containing suspicious shortcodes or patterns. Additionally, restrict access to the plugin's administrative interface to authorized users only. Monitor WordPress plugin activity logs for any unusual shortcode executions. After upgrading, verify the fix by attempting to execute a known malicious shortcode and confirming that it is blocked.

Hoe te verhelpenwordt vertaald…

Actualice el plugin So-Called Air Quotes a una versión corregida.  La vulnerabilidad se debe a una validación inadecuada de los valores antes de ejecutar do_shortcode, lo que permite la ejecución de shortcodes arbitrarios.  Consulte las fuentes de referencia para obtener más información sobre la solución.

CVE Beveiligingsnieuwsbrief

Kwetsbaarheidsanalyses en kritieke waarschuwingen direct in uw inbox.

Veelgestelde vragenwordt vertaald…

What is CVE-2025-2803 — Arbitrary Shortcode in So-Called Air Quotes?

CVE-2025-2803 is a vulnerability in the So-Called Air Quotes WordPress plugin allowing unauthenticated attackers to execute arbitrary shortcodes due to insufficient input validation.

Am I affected by CVE-2025-2803 in So-Called Air Quotes?

You are affected if you are using the So-Called Air Quotes WordPress plugin in versions 0.0.0 through 0.1. Check your plugin versions immediately.

How do I fix CVE-2025-2803 in So-Called Air Quotes?

Upgrade to a patched version of the So-Called Air Quotes plugin as soon as it's available. Until then, implement WAF rules or restrict access to the plugin's admin interface.

Is CVE-2025-2803 being actively exploited?

While no active exploitation has been confirmed, the vulnerability's nature makes it likely to be targeted. Monitor your systems closely.

Where can I find the official So-Called Air Quotes advisory for CVE-2025-2803?

Check the plugin developer's website or the WordPress plugin directory for official security advisories related to CVE-2025-2803.

Is jouw project getroffen?

Upload je dependency-bestand en kom direct te weten of deze en andere CVEs jou raken.