Advanced Views WordPress Plugin CVE-2025-10380: Brief Summary of Server-Side Template Injection

This post provides a brief summary of CVE-2025-10380, a Server-Side Template Injection vulnerability in the Advanced Views WordPress plugin up to version 3.7.19. The summary focuses on technical details, affected versions, and vendor security history based on available public sources.
CVE Analysis

7 min read

ZeroPath CVE Analysis

ZeroPath CVE Analysis

2025-09-22

Advanced Views WordPress Plugin CVE-2025-10380: Brief Summary of Server-Side Template Injection
Experimental AI-Generated Content

This CVE analysis is an experimental publication that is completely AI-generated. The content may contain errors or inaccuracies and is subject to change as more information becomes available. We are continuously refining our process.

If you have feedback, questions, or notice any errors, please reach out to us.

[email protected]

Introduction

Attackers with author-level access can execute arbitrary PHP code on WordPress sites using Advanced Views plugin versions up to and including 3.7.19. This risk is not theoretical: it enables full compromise of affected sites through a Server-Side Template Injection (SSTI) flaw in a widely used plugin for dynamic content display and custom fields.

About the Involved Software: Advanced Views is a WordPress plugin developed by WPLake, designed to display posts and custom fields from sources like ACF, MetaBox, Pods, and WooCommerce. It is popular among developers for its flexibility and integration with modern templating engines like Twig. The plugin is used by a significant number of WordPress sites, especially those requiring advanced content presentation.

Technical Information

CVE-2025-10380 is a Server-Side Template Injection vulnerability in the Advanced Views plugin for WordPress, affecting all versions up to and including 3.7.19. The vulnerability is due to insufficient input sanitization and lack of access control when processing custom Twig templates in the Model panel. Authenticated users with author-level privileges or higher can inject malicious Twig template code, which is then executed on the server.

The vulnerable code resides in the plugin's src/Template_Engines/Twig.php file, specifically at or around line 106 in version 3.7.19 (reference). The flaw allows attackers to execute arbitrary PHP code and system commands via crafted Twig templates. The root cause is improper neutralization of special elements used in the template engine, classified as CWE-1336.

No public proof of concept or exploit code has been provided in the referenced sources. The vulnerability requires authentication but does not require administrative privileges, making it accessible to a broader set of users in typical WordPress deployments.

Affected Systems and Versions

  • Product: Advanced Views – Display Posts, Custom Fields, and More (WordPress plugin)
  • Affected versions: All versions up to and including 3.7.19
  • Vulnerable configuration: Any WordPress site with the plugin installed and author-level (or higher) authenticated users who can create or edit custom Twig templates in the Model panel

Vendor Security History

Advanced Views is developed by WPLake. The plugin is widely adopted for advanced content display in WordPress. Previous vulnerabilities in Advanced Views have not been widely reported, but the plugin's integration with powerful template engines like Twig increases its attack surface. WPLake generally maintains good documentation and update cadence, but this SSTI issue highlights the risks of processing user-supplied template code.

References

Related Articles

Chaos Mesh CVE-2025-59358: Brief Summary of Cluster-wide GraphQL Authentication Bypass
CVE Analysis

2025-09-15

8 min read

Chaos Mesh CVE-2025-59358: Brief Summary of Cluster-wide GraphQL Authentication Bypass

This post provides a brief summary of CVE-2025-59358, a high-severity authentication bypass in Chaos Mesh's Controller Manager. The vulnerability exposes a GraphQL debugging server to the entire Kubernetes cluster without authentication, allowing arbitrary process termination in any pod and enabling denial of service attacks. Includes affected versions, technical details, and references.

ZeroPath CVE Analysis

ZeroPath CVE Analysis

Chaos Mesh CVE-2025-59359: Brief Summary of Critical OS Command Injection in cleanTcs Mutation
CVE Analysis

2025-09-15

8 min read

Chaos Mesh CVE-2025-59359: Brief Summary of Critical OS Command Injection in cleanTcs Mutation

This post provides a brief summary of CVE-2025-59359, a critical OS command injection vulnerability in the cleanTcs mutation of Chaos Mesh's Chaos Controller Manager. The flaw allows unauthenticated in-cluster attackers to execute arbitrary commands, potentially leading to remote code execution across Kubernetes clusters. Key technical details, affected versions, and references are included.

ZeroPath CVE Analysis

ZeroPath CVE Analysis

Chaos Mesh CVE-2025-59360: Brief Summary of Critical Command Injection in Kubernetes Chaos Controller Manager
CVE Analysis

2025-09-15

8 min read

Chaos Mesh CVE-2025-59360: Brief Summary of Critical Command Injection in Kubernetes Chaos Controller Manager

This post provides a brief summary of CVE-2025-59360, a critical command injection vulnerability in Chaos Mesh's Chaos Controller Manager for Kubernetes. We cover the technical mechanism, affected versions, and vendor security context, with references to public advisories and research.

ZeroPath CVE Analysis

ZeroPath CVE Analysis

Detect & fix
what others miss