Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14541: CWE-94 Improper Control of Generation of Code ('Code Injection') in villatheme Lucky Wheel Giveaway

0
High
VulnerabilityCVE-2025-14541cvecve-2025-14541cwe-94
Published: Wed Feb 11 2026 (02/11/2026, 01:23:34 UTC)
Source: CVE Database V5
Vendor/Project: villatheme
Product: Lucky Wheel Giveaway

Description

The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:25:22 UTC

Technical Analysis

CVE-2025-14541 is a remote code execution (RCE) vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in the Lucky Wheel Giveaway plugin for WordPress, developed by villatheme. This vulnerability affects all versions up to and including 1.0.22. The root cause is the plugin's unsafe use of PHP's eval() function on the 'conditional_tags' parameter, which is user-controlled input. Because eval() executes arbitrary PHP code, an attacker with administrator-level privileges can inject and execute malicious code on the server hosting the WordPress site. The vulnerability does not require additional user interaction beyond authentication and can lead to full system compromise, including unauthorized data access, modification, or destruction, and potential pivoting to other network resources. The CVSS v3.1 base score is 7.2, reflecting high severity with network attack vector, low attack complexity, high privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or official fixes are currently available, and no exploits have been observed in the wild. The vulnerability was reserved in December 2025 and published in February 2026. The plugin's widespread use in WordPress sites, especially those running promotional or marketing campaigns, increases the risk profile. The vulnerability highlights the dangers of using eval() on untrusted input without rigorous sanitization or validation.

Potential Impact

The impact of CVE-2025-14541 is significant for organizations running WordPress sites with the Lucky Wheel Giveaway plugin installed. Successful exploitation allows attackers with administrator privileges to execute arbitrary PHP code, potentially leading to full server compromise. This can result in data breaches exposing sensitive customer and business information, defacement or manipulation of website content, installation of backdoors or malware, and disruption of services causing downtime. The integrity and availability of the affected systems are at high risk, which can damage organizational reputation and incur financial losses. Since the attack requires administrator access, the threat is primarily from insider threats or attackers who have already compromised credentials, but the ease of code execution once access is gained amplifies the risk. Organizations relying on this plugin for customer engagement or marketing campaigns may face operational interruptions and compliance violations if exploited.

Mitigation Recommendations

To mitigate CVE-2025-14541, organizations should immediately audit their WordPress installations to identify the presence of the Lucky Wheel Giveaway plugin. If found, disable or uninstall the plugin until a secure patch is released by villatheme. Restrict administrator privileges strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of credential compromise. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the 'conditional_tags' parameter. Conduct regular security reviews and code audits for plugins, especially those that use dynamic code execution functions like eval(). Monitor server logs for unusual activity indicative of exploitation attempts. Additionally, consider isolating WordPress environments and employing least privilege principles for all user roles. Stay informed about vendor updates and apply patches promptly once available. For long-term security, avoid plugins that rely on unsafe coding practices such as eval() on user input.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-11T12:57:34.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698bdf6c4b57a58fa14457fa

Added to database: 2/11/2026, 1:46:20 AM

Last enriched: 2/27/2026, 11:25:22 AM

Last updated: 4/5/2026, 3:30:08 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses