MEDIUM (6.2)
    Plugin

    Unauthenticated Arbitrary Shortcode Execution in Responsive Plus Plugin

    Published Date: 3/26/2026
    CVE ID: CVE-2025-15488

    Summary

    The Responsive Plus WordPress plugin prior to version 3.4.3 allows unauthenticated users to execute arbitrary shortcodes due to improper validation of input in the update_responsive_woo_free_shipping_left_shortcode AJAX action. This vulnerability could be exploited to execute unintended code on affected sites.

    Vulnerability Details

    This vulnerability arises from the plugin's failure to validate input parameters adequately in a specific AJAX action accessible by unauthenticated users. The plugin, intended to enhance WooCommerce responsiveness, includes an AJAX action `update_responsive_woo_free_shipping_left_shortcode` which processes user input as a shortcode without proper verification. As a result, attackers can craft requests that pass arbitrary data which gets executed as a shortcode. This flaw can lead to a range of issues, including unauthorized data manipulation or display on the website if malicious content is executed. The severity of this vulnerability is context-dependent, focusing mainly on its potential to disrupt website operations or expose sensitive information.

    Recommendations

    Site administrators should immediately restrict access to the affected AJAX action by utilizing security plugins that block unauthenticated AJAX requests. Monitoring for any unexplained shortcode execution or content changes is also suggested. Applying the principle of least privilege to reduce unauthorized access could further mitigate potential exploits.

    Available Fixes

    Last Updated: 3/28/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More