Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 06 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpchill Wpchill strong Testimonials |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpchill Wpchill strong Testimonials |
Thu, 06 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Strong Testimonials plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.2.16. This is due to the software allowing users to submit a testimonial in which a value is not properly validated or sanitized prior to being passed to a do_shortcode call. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes if an administrator previews or publishes a crafted testimonial. | |
| Title | Strong Testimonials <= 3.2.16 - Unauthenticated Arbitrary Shortcode Execution | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:23:38.359Z
Reserved: 2025-10-03T19:03:57.976Z
Link: CVE-2025-11268
Updated: 2025-11-06T14:44:47.081Z
Status : Deferred
Published: 2025-11-06T09:15:33.197
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11268
No data.
OpenCVE Enrichment
Updated: 2026-04-21T18:45:06Z