Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14615: CWE-352 Cross-Site Request Forgery (CSRF) in dashboardbuilder DASHBOARD BUILDER – WordPress plugin for Charts and Graphs

0
High
VulnerabilityCVE-2025-14615cvecve-2025-14615cwe-352
Published: Wed Jan 14 2026 (01/14/2026, 05:28:03 UTC)
Source: CVE Database V5
Vendor/Project: dashboardbuilder
Product: DASHBOARD BUILDER – WordPress plugin for Charts and Graphs

Description

CVE-2025-14615 is a high-severity Cross-Site Request Forgery (CSRF) vulnerability in the DASHBOARD BUILDER WordPress plugin for Charts and Graphs, affecting all versions up to 1. 5. 7. The flaw arises from missing nonce validation on the settings handler, allowing unauthenticated attackers to trick site administrators into executing forged requests. This enables modification of stored SQL queries and database credentials used by the plugin's shortcode, leading to arbitrary SQL injection and potential data exfiltration via publicly visible chart outputs. Exploitation requires user interaction (administrator clicking a malicious link) but no prior authentication. While no known exploits are currently in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin. European organizations using this plugin should prioritize patching or mitigation to prevent data breaches and unauthorized database access.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:44:16 UTC

Technical Analysis

The DASHBOARD BUILDER WordPress plugin (versions up to and including 1.5.7) suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14615. The root cause is the absence of nonce validation in the settings handler within dashboardbuilder-admin.php, which is responsible for processing configuration changes. This security oversight allows an attacker to craft a malicious request that, when executed by an authenticated administrator (via clicking a link or visiting a malicious page), modifies the plugin's stored SQL query and database credentials. The plugin uses these stored queries to generate charts and graphs on the front-end through the [show-dashboardbuilder] shortcode. By altering the SQL query, the attacker can inject arbitrary SQL commands, potentially extracting sensitive data from the database and displaying it publicly within the chart output. The vulnerability requires no authentication from the attacker but does require user interaction from an administrator, making it a significant risk especially on sites with high-privilege users. The CVSS 3.1 score is 7.1 (high), reflecting the ease of exploitation (network vector, no privileges required, user interaction needed) and the high confidentiality impact due to data exposure. No patches or exploits are currently publicly known, but the vulnerability's nature suggests it could be leveraged for data theft or further compromise if weaponized.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive data stored in WordPress databases, including potentially personal data protected under GDPR. The ability to modify SQL queries and database credentials could also allow attackers to pivot to further attacks, such as privilege escalation or persistent backdoors. Organizations relying on the DASHBOARD BUILDER plugin for business intelligence or reporting risk exposure of confidential business metrics or customer information. The public nature of the data exfiltration via chart outputs increases the risk of data leakage without detection. This could result in regulatory penalties, reputational damage, and operational disruption. Given the widespread use of WordPress in Europe and the popularity of dashboard plugins, the threat surface is significant. Attackers exploiting this vulnerability could target government, healthcare, financial, and e-commerce sectors where data confidentiality is paramount.

Mitigation Recommendations

Immediate mitigation steps include disabling the DASHBOARD BUILDER plugin until a security patch is released. Administrators should avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress admin panels. Implementing Web Application Firewall (WAF) rules to detect and block CSRF attempts targeting the plugin’s settings handler can reduce risk. Site owners should enforce strict Content Security Policies (CSP) and use browser security features to limit cross-site requests. Monitoring logs for unusual changes to plugin settings or database queries can help detect exploitation attempts. Once available, promptly apply vendor patches or updates that add nonce validation and fix the CSRF flaw. Additionally, restricting administrative access by IP or using multi-factor authentication (MFA) can reduce the likelihood of successful exploitation. Regular backups and database integrity checks will aid recovery if compromise occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T20:47:27.527Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fe2

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 1/21/2026, 8:44:16 PM

Last updated: 2/7/2026, 11:44:14 AM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats