Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-30829 | The WPCasa plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.4.1. This is due to insufficient input validation and restriction on the 'api_requests' function. This makes it possible for unauthenticated attackers to call arbitrary functions and execute code. |
Tue, 23 Sep 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Wpsight Wpsight wpcasa |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Wpsight Wpsight wpcasa |
Tue, 23 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 23 Sep 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WPCasa plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.4.1. This is due to insufficient input validation and restriction on the 'api_requests' function. This makes it possible for unauthenticated attackers to call arbitrary functions and execute code. | |
| Title | WPCasa <= 1.4.1 - Unauthenticated Code Injection | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:19:45.258Z
Reserved: 2025-08-21T18:07:39.969Z
Link: CVE-2025-9321
Updated: 2025-09-23T13:49:03.367Z
Status : Deferred
Published: 2025-09-23T05:15:35.970
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-9321
No data.
OpenCVE Enrichment
Updated: 2026-04-20T19:30:06Z
EUVD