CVE-2025-14166: CWE-94 Improper Control of Generation of Code ('Code Injection') in ludwigyou WPMasterToolKit (WPMTK) – All in one plugin
The WPMasterToolKit plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.13.0. This is due to the plugin allowing Author-level users to create and execute arbitrary PHP code through the Code Snippets feature without proper capability checks. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server, leading to remote code execution, privilege escalation, and complete site compromise.
AI Analysis
Technical Summary
CVE-2025-14166 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WPMasterToolKit (WPMTK) WordPress plugin developed by ludwigyou. This plugin, widely used for site management, contains a critical flaw in its Code Snippets feature that allows authenticated users with Contributor-level or higher privileges to inject and execute arbitrary PHP code on the server. The root cause is the lack of proper capability checks restricting who can create and run PHP code snippets. Since Contributors and above can exploit this, an attacker with relatively low privileges can escalate their access to full remote code execution on the hosting server, potentially leading to complete site compromise and privilege escalation. The vulnerability affects all versions up to and including 2.13.0. Despite the serious nature of the flaw, the CVSS v3.1 score is 5.3 (medium severity), likely because no known exploits are currently in the wild and the attack requires authenticated access. The vulnerability does not impact confidentiality directly but threatens integrity by allowing code injection and availability by potentially disrupting site operations. The flaw was publicly disclosed on December 12, 2025, with no patches yet available, emphasizing the need for immediate mitigation. The vulnerability is particularly dangerous in multi-user WordPress environments where Contributor roles are assigned, as it bypasses expected privilege boundaries. Given WordPress's widespread use in Europe, this vulnerability poses a significant risk to many organizations relying on the WPMasterToolKit plugin for site management.
Potential Impact
For European organizations, this vulnerability presents a significant risk to WordPress-based websites, especially those that allow Contributor-level users to access the Code Snippets feature. Successful exploitation can lead to remote code execution on web servers, enabling attackers to escalate privileges, deface websites, steal sensitive data, or deploy malware. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is compromised. Organizations running multi-user WordPress sites with the affected plugin are particularly vulnerable. The medium CVSS score reflects the need for authentication, but the ease of privilege escalation once inside makes the threat impactful. Since WordPress powers a large portion of European websites, including e-commerce, government, and media sites, the potential for widespread impact exists. Additionally, compromised sites can be used as launchpads for further attacks within corporate networks or to distribute malicious content to European users. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the WPMasterToolKit plugin and determine the version in use. 2. Restrict the assignment of Contributor-level or higher roles to trusted users only, minimizing the risk of insider exploitation. 3. Disable or restrict access to the Code Snippets feature within the plugin until a security patch is released. 4. Monitor server and application logs for unusual PHP execution or unauthorized code changes indicative of exploitation attempts. 5. Implement web application firewalls (WAF) with custom rules to detect and block suspicious PHP code injection patterns related to this plugin. 6. Once available, promptly apply vendor patches or updates addressing this vulnerability. 7. Educate site administrators and users about the risks of elevated privileges and the importance of role-based access control. 8. Consider isolating WordPress environments or using containerization to limit the blast radius of potential compromises. 9. Regularly back up site data and configurations to enable rapid recovery in case of compromise. 10. Engage in threat intelligence sharing within industry groups to stay informed about emerging exploits targeting this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14166: CWE-94 Improper Control of Generation of Code ('Code Injection') in ludwigyou WPMasterToolKit (WPMTK) – All in one plugin
Description
The WPMasterToolKit plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 2.13.0. This is due to the plugin allowing Author-level users to create and execute arbitrary PHP code through the Code Snippets feature without proper capability checks. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute arbitrary PHP code on the server, leading to remote code execution, privilege escalation, and complete site compromise.
AI-Powered Analysis
Technical Analysis
CVE-2025-14166 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the WPMasterToolKit (WPMTK) WordPress plugin developed by ludwigyou. This plugin, widely used for site management, contains a critical flaw in its Code Snippets feature that allows authenticated users with Contributor-level or higher privileges to inject and execute arbitrary PHP code on the server. The root cause is the lack of proper capability checks restricting who can create and run PHP code snippets. Since Contributors and above can exploit this, an attacker with relatively low privileges can escalate their access to full remote code execution on the hosting server, potentially leading to complete site compromise and privilege escalation. The vulnerability affects all versions up to and including 2.13.0. Despite the serious nature of the flaw, the CVSS v3.1 score is 5.3 (medium severity), likely because no known exploits are currently in the wild and the attack requires authenticated access. The vulnerability does not impact confidentiality directly but threatens integrity by allowing code injection and availability by potentially disrupting site operations. The flaw was publicly disclosed on December 12, 2025, with no patches yet available, emphasizing the need for immediate mitigation. The vulnerability is particularly dangerous in multi-user WordPress environments where Contributor roles are assigned, as it bypasses expected privilege boundaries. Given WordPress's widespread use in Europe, this vulnerability poses a significant risk to many organizations relying on the WPMasterToolKit plugin for site management.
Potential Impact
For European organizations, this vulnerability presents a significant risk to WordPress-based websites, especially those that allow Contributor-level users to access the Code Snippets feature. Successful exploitation can lead to remote code execution on web servers, enabling attackers to escalate privileges, deface websites, steal sensitive data, or deploy malware. This can disrupt business operations, damage reputation, and lead to regulatory non-compliance under GDPR if personal data is compromised. Organizations running multi-user WordPress sites with the affected plugin are particularly vulnerable. The medium CVSS score reflects the need for authentication, but the ease of privilege escalation once inside makes the threat impactful. Since WordPress powers a large portion of European websites, including e-commerce, government, and media sites, the potential for widespread impact exists. Additionally, compromised sites can be used as launchpads for further attacks within corporate networks or to distribute malicious content to European users. The absence of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the WPMasterToolKit plugin and determine the version in use. 2. Restrict the assignment of Contributor-level or higher roles to trusted users only, minimizing the risk of insider exploitation. 3. Disable or restrict access to the Code Snippets feature within the plugin until a security patch is released. 4. Monitor server and application logs for unusual PHP execution or unauthorized code changes indicative of exploitation attempts. 5. Implement web application firewalls (WAF) with custom rules to detect and block suspicious PHP code injection patterns related to this plugin. 6. Once available, promptly apply vendor patches or updates addressing this vulnerability. 7. Educate site administrators and users about the risks of elevated privileges and the importance of role-based access control. 8. Consider isolating WordPress environments or using containerization to limit the blast radius of potential compromises. 9. Regularly back up site data and configurations to enable rapid recovery in case of compromise. 10. Engage in threat intelligence sharing within industry groups to stay informed about emerging exploits targeting this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-05T21:21:47.576Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b918b650da22753edbe40
Added to database: 12/12/2025, 3:52:43 AM
Last enriched: 12/19/2025, 5:11:38 AM
Last updated: 2/7/2026, 1:51:03 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.