VYPR
High severity7.3NVD Advisory· Published May 6, 2025· Updated Apr 15, 2026

CVE-2025-2802

CVE-2025-2802

Description

The LayoutBoxx plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 0.3.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The LayoutBoxx WordPress plugin up to 0.3.1 allows unauthenticated attackers to execute arbitrary shortcodes due to insufficient validation before calling do_shortcode.

Vulnerability

Overview The LayoutBoxx plugin for WordPress, in all versions up to and including 0.3.1, contains a vulnerability that permits arbitrary shortcode execution. The root cause is that the plugin passes a user-supplied value directly to the do_shortcode() function without proper validation or sanitization [1]. This oversight allows an attacker to inject and execute any WordPress shortcode, including those that may perform sensitive operations.

Exploitation

Conditions Exploitation does not require authentication; an unauthenticated attacker can trigger the vulnerable action by sending a crafted request to the WordPress instance. The plugin's code shows that the do_shortcode call is made within a shortcode handler, but the vulnerability lies in the lack of input validation before that call [1]. No special privileges or network position beyond standard web access are needed.

Impact

Successful exploitation enables an attacker to execute arbitrary shortcodes. Depending on the available shortcodes (including those from other plugins or core), this could lead to privilege escalation, data exfiltration, or other malicious actions. The severity is rated High (CVSS 7.3) due to the low attack complexity and no required privileges.

Mitigation

Status As of the publication date (2025-05-06), no patched version has been released. Users are advised to disable or remove the LayoutBoxx plugin until a fix is available. The vulnerability is not yet listed in CISA's Known Exploited Vulnerabilities catalog, but given the ease of exploitation, immediate action is recommended.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.