CVE-2025-14476: CWE-502 Deserialization of Untrusted Data in unitecms Doubly – Cross Domain Copy Paste for WordPress
The Doubly – Cross Domain Copy Paste for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.46 via deserialization of untrusted input from the content.txt file within uploaded ZIP archives. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary code, delete files, retrieve sensitive data, or perform other actions depending on the available gadgets. This is only exploitable by subscribers, when administrators have explicitly enabled that access.
AI Analysis
Technical Summary
CVE-2025-14476 is a critical PHP Object Injection vulnerability affecting the Doubly – Cross Domain Copy Paste for WordPress plugin developed by unitecms. The flaw arises from unsafe deserialization of untrusted input contained within a content.txt file inside ZIP archives uploaded through the plugin. Specifically, all plugin versions up to and including 1.0.46 are vulnerable. An attacker with at least Subscriber-level privileges can upload a crafted ZIP archive containing malicious serialized PHP objects. When the plugin processes the content.txt file, it deserializes these objects without proper validation, enabling PHP Object Injection. The presence of a Property Oriented Programming (POP) gadget chain within the plugin's codebase allows attackers to escalate this injection into arbitrary code execution on the server. This can lead to deletion of files, unauthorized data access, or other malicious actions depending on available gadgets. Exploitation requires that administrators have enabled subscriber upload permissions, which is not enabled by default, thus limiting the attack surface. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact and low attack complexity. Although no public exploits have been observed, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those allowing subscriber uploads. No official patches or updates have been linked yet, so mitigation may require disabling subscriber uploads or removing the plugin until a fix is available.
Potential Impact
For European organizations, this vulnerability presents a serious risk to WordPress-based websites that utilize the Doubly – Cross Domain Copy Paste plugin, especially those that allow subscriber-level users to upload content. Successful exploitation could lead to full compromise of the affected web server, resulting in data breaches, defacement, or service disruption. Confidentiality is at high risk due to potential data exfiltration, integrity is compromised through arbitrary code execution and file deletion, and availability can be impacted by destructive actions. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened legal and reputational risks if exploited. The attack requires authenticated access, which somewhat limits exposure, but insider threats or compromised subscriber accounts could be leveraged. Given WordPress's widespread use across Europe, the vulnerability could affect a broad range of entities from SMEs to large enterprises. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores urgency.
Mitigation Recommendations
1. Immediately review and restrict subscriber-level upload permissions in WordPress administrative settings; disable subscriber uploads if not strictly necessary. 2. Remove or disable the Doubly – Cross Domain Copy Paste plugin until an official patch or update is released by unitecms. 3. Monitor WordPress user accounts for suspicious subscriber activity or unauthorized uploads. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious ZIP archive uploads or deserialization attempts targeting the plugin. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and deserialization vulnerabilities. 6. Educate administrators about the risks of enabling subscriber uploads and enforce strict access controls. 7. Once a patch is available, apply it promptly and verify the plugin version is updated beyond 1.0.46. 8. Consider isolating WordPress instances or running them with least privilege to limit impact of potential exploitation. 9. Maintain comprehensive backups to enable recovery in case of compromise. 10. Stay informed via trusted vulnerability databases and security advisories for any emerging exploit information.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-14476: CWE-502 Deserialization of Untrusted Data in unitecms Doubly – Cross Domain Copy Paste for WordPress
Description
The Doubly – Cross Domain Copy Paste for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.46 via deserialization of untrusted input from the content.txt file within uploaded ZIP archives. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary code, delete files, retrieve sensitive data, or perform other actions depending on the available gadgets. This is only exploitable by subscribers, when administrators have explicitly enabled that access.
AI-Powered Analysis
Technical Analysis
CVE-2025-14476 is a critical PHP Object Injection vulnerability affecting the Doubly – Cross Domain Copy Paste for WordPress plugin developed by unitecms. The flaw arises from unsafe deserialization of untrusted input contained within a content.txt file inside ZIP archives uploaded through the plugin. Specifically, all plugin versions up to and including 1.0.46 are vulnerable. An attacker with at least Subscriber-level privileges can upload a crafted ZIP archive containing malicious serialized PHP objects. When the plugin processes the content.txt file, it deserializes these objects without proper validation, enabling PHP Object Injection. The presence of a Property Oriented Programming (POP) gadget chain within the plugin's codebase allows attackers to escalate this injection into arbitrary code execution on the server. This can lead to deletion of files, unauthorized data access, or other malicious actions depending on available gadgets. Exploitation requires that administrators have enabled subscriber upload permissions, which is not enabled by default, thus limiting the attack surface. The vulnerability has a CVSS 3.1 base score of 8.8, reflecting its high impact and low attack complexity. Although no public exploits have been observed, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those allowing subscriber uploads. No official patches or updates have been linked yet, so mitigation may require disabling subscriber uploads or removing the plugin until a fix is available.
Potential Impact
For European organizations, this vulnerability presents a serious risk to WordPress-based websites that utilize the Doubly – Cross Domain Copy Paste plugin, especially those that allow subscriber-level users to upload content. Successful exploitation could lead to full compromise of the affected web server, resulting in data breaches, defacement, or service disruption. Confidentiality is at high risk due to potential data exfiltration, integrity is compromised through arbitrary code execution and file deletion, and availability can be impacted by destructive actions. Organizations in sectors with strict data protection regulations such as GDPR (e.g., finance, healthcare, government) face heightened legal and reputational risks if exploited. The attack requires authenticated access, which somewhat limits exposure, but insider threats or compromised subscriber accounts could be leveraged. Given WordPress's widespread use across Europe, the vulnerability could affect a broad range of entities from SMEs to large enterprises. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores urgency.
Mitigation Recommendations
1. Immediately review and restrict subscriber-level upload permissions in WordPress administrative settings; disable subscriber uploads if not strictly necessary. 2. Remove or disable the Doubly – Cross Domain Copy Paste plugin until an official patch or update is released by unitecms. 3. Monitor WordPress user accounts for suspicious subscriber activity or unauthorized uploads. 4. Implement Web Application Firewall (WAF) rules to detect and block suspicious ZIP archive uploads or deserialization attempts targeting the plugin. 5. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and deserialization vulnerabilities. 6. Educate administrators about the risks of enabling subscriber uploads and enforce strict access controls. 7. Once a patch is available, apply it promptly and verify the plugin version is updated beyond 1.0.46. 8. Consider isolating WordPress instances or running them with least privilege to limit impact of potential exploitation. 9. Maintain comprehensive backups to enable recovery in case of compromise. 10. Stay informed via trusted vulnerability databases and security advisories for any emerging exploit information.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T18:32:10.966Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef65d977419e584a50ab
Added to database: 12/13/2025, 4:45:25 AM
Last enriched: 12/20/2025, 6:22:47 AM
Last updated: 2/7/2026, 6:49:50 PM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.