CVE-2025-14166: CWE-94 Improper Control of Generation of Code ('Code Injection') in ludwigyou WPMasterToolKit (WPMTK) – All in one plugin
The WPMasterToolKit plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.13.0. This is due to the plugin allowing Author-level users to create and execute arbitrary PHP code through the Code Snippets feature without proper capability checks. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server, leading to remote code execution, privilege escalation, and complete site compromise.
AI Analysis
Technical Summary
CVE-2025-14166 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WPMasterToolKit (WPMTK) WordPress plugin, versions up to and including 2.13.0. The flaw arises because the plugin's Code Snippets feature permits users with Contributor-level or higher privileges to inject and execute arbitrary PHP code without proper capability checks. This means that an attacker who has at least Contributor access to a WordPress site can leverage this feature to run malicious PHP code on the server hosting the site. The consequence of this vulnerability is severe: it enables remote code execution (RCE), which can lead to privilege escalation within the WordPress environment and potentially full compromise of the affected website. The vulnerability is network exploitable without user interaction once the attacker has authenticated access, but it does not require elevated privileges beyond Contributor level. The CVSS 3.1 base score is 5.3, reflecting a medium severity primarily due to the requirement for authenticated access and the lack of direct confidentiality or availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk given the widespread use of WordPress and the plugin. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation. The vulnerability affects all versions of the plugin, indicating a systemic issue in the plugin's design regarding capability checks for code execution features.
Potential Impact
For European organizations, this vulnerability presents a notable risk to websites and web applications running WordPress with the WPMasterToolKit plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to execute arbitrary PHP code on the web server. This can result in full site compromise, data manipulation, defacement, or use of the server as a pivot point for further attacks within the organization's network. Given the plugin's popularity among WordPress users, organizations relying on it for site management or functionality could face significant operational disruptions and reputational damage. The medium CVSS score reflects that while the vulnerability requires authenticated access, the ease of exploitation by users with relatively low privileges (Contributor level) increases the threat surface. European organizations in sectors with high web presence, such as e-commerce, media, and government, are particularly vulnerable. Additionally, compromised sites could be leveraged for phishing, malware distribution, or as part of botnets, amplifying the broader security impact within the region.
Mitigation Recommendations
1. Immediately audit WordPress user roles and restrict Contributor-level or higher access to trusted users only, minimizing the number of users who can exploit this vulnerability. 2. Disable or remove the WPMasterToolKit plugin if it is not essential to reduce the attack surface until a patch is available. 3. Monitor WordPress sites for unusual activity, especially in the Code Snippets feature, and review logs for unauthorized code execution attempts. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious PHP code injection attempts targeting the plugin. 5. Apply principle of least privilege to all WordPress users and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of compromised accounts. 6. Stay informed about vendor updates and apply patches promptly once released. 7. Conduct regular security assessments and penetration testing focused on WordPress plugins and user privilege configurations. 8. Backup WordPress sites and databases regularly to enable rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-14166: CWE-94 Improper Control of Generation of Code ('Code Injection') in ludwigyou WPMasterToolKit (WPMTK) – All in one plugin
Description
The WPMasterToolKit plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.13.0. This is due to the plugin allowing Author-level users to create and execute arbitrary PHP code through the Code Snippets feature without proper capability checks. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server, leading to remote code execution, privilege escalation, and complete site compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-14166 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WPMasterToolKit (WPMTK) WordPress plugin, versions up to and including 2.13.0. The flaw arises because the plugin's Code Snippets feature permits users with Contributor-level or higher privileges to inject and execute arbitrary PHP code without proper capability checks. This means that an attacker who has at least Contributor access to a WordPress site can leverage this feature to run malicious PHP code on the server hosting the site. The consequence of this vulnerability is severe: it enables remote code execution (RCE), which can lead to privilege escalation within the WordPress environment and potentially full compromise of the affected website. The vulnerability is network exploitable without user interaction once the attacker has authenticated access, but it does not require elevated privileges beyond Contributor level. The CVSS 3.1 base score is 5.3, reflecting a medium severity primarily due to the requirement for authenticated access and the lack of direct confidentiality or availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk given the widespread use of WordPress and the plugin. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate risk mitigation. The vulnerability affects all versions of the plugin, indicating a systemic issue in the plugin's design regarding capability checks for code execution features.
Potential Impact
For European organizations, this vulnerability presents a notable risk to websites and web applications running WordPress with the WPMasterToolKit plugin installed. Successful exploitation can lead to unauthorized remote code execution, allowing attackers to execute arbitrary PHP code on the web server. This can result in full site compromise, data manipulation, defacement, or use of the server as a pivot point for further attacks within the organization's network. Given the plugin's popularity among WordPress users, organizations relying on it for site management or functionality could face significant operational disruptions and reputational damage. The medium CVSS score reflects that while the vulnerability requires authenticated access, the ease of exploitation by users with relatively low privileges (Contributor level) increases the threat surface. European organizations in sectors with high web presence, such as e-commerce, media, and government, are particularly vulnerable. Additionally, compromised sites could be leveraged for phishing, malware distribution, or as part of botnets, amplifying the broader security impact within the region.
Mitigation Recommendations
1. Immediately audit WordPress user roles and restrict Contributor-level or higher access to trusted users only, minimizing the number of users who can exploit this vulnerability. 2. Disable or remove the WPMasterToolKit plugin if it is not essential to reduce the attack surface until a patch is available. 3. Monitor WordPress sites for unusual activity, especially in the Code Snippets feature, and review logs for unauthorized code execution attempts. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious PHP code injection attempts targeting the plugin. 5. Apply principle of least privilege to all WordPress users and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of compromised accounts. 6. Stay informed about vendor updates and apply patches promptly once released. 7. Conduct regular security assessments and penetration testing focused on WordPress plugins and user privilege configurations. 8. Backup WordPress sites and databases regularly to enable rapid recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T21:21:47.576Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b918b650da22753edbe40
Added to database: 12/12/2025, 3:52:43 AM
Last enriched: 12/12/2025, 4:03:35 AM
Last updated: 12/14/2025, 10:14:11 PM
Views: 15
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14672: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14674: Injection in aizuda snail-job
MediumCVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14668: SQL Injection in campcodes Advanced Online Examination System
MediumCVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.