
Cloud Vulnerability DB
A community-led vulnerabilities database
The Copypress Rest API plugin for WordPress contains a critical Remote Code Execution vulnerability (CVE-2025-8625) affecting versions 1.1 to 1.2. The vulnerability was discovered and disclosed on September 29, 2025, with a CVSS score of 9.8 (Critical). The plugin was subsequently closed on September 26, 2025, pending a full security review (NVD, WordPress).
The vulnerability stems from two critical security issues: a hard-coded JWT signing key implementation and insufficient file type validation in the copyreap_handle_image() function. When no secret is defined, the plugin defaults to a hard-coded JWT signing key. Additionally, the plugin lacks proper validation for file types that can be fetched and saved as attachments (NVD).
The vulnerability allows unauthenticated attackers to forge valid tokens to gain elevated privileges and upload arbitrary files, including PHP scripts, through the image handler. This can lead to remote code execution on affected WordPress installations (NVD).
The plugin has been temporarily closed and removed from the WordPress plugin repository pending a full security review. Users are advised to immediately remove the plugin from their WordPress installations until a patched version is released (WordPress).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."