Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14615: CWE-352 Cross-Site Request Forgery (CSRF) in dashboardbuilder DASHBOARD BUILDER – WordPress plugin for Charts and Graphs

0
High
VulnerabilityCVE-2025-14615cvecve-2025-14615cwe-352
Published: Wed Jan 14 2026 (01/14/2026, 05:28:03 UTC)
Source: CVE Database V5
Vendor/Project: dashboardbuilder
Product: DASHBOARD BUILDER – WordPress plugin for Charts and Graphs

Description

The DASHBOARD BUILDER – WordPress plugin for Charts and Graphs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.7. This is due to missing nonce validation on the settings handler in dashboardbuilder-admin.php. This makes it possible for unauthenticated attackers to modify the stored SQL query and database credentials used by the [show-dashboardbuilder] shortcode via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The modified SQL query is subsequently executed on the front-end when the shortcode is rendered, enabling arbitrary SQL injection and data exfiltration through the publicly visible chart output.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:28:08 UTC

Technical Analysis

The DASHBOARD BUILDER WordPress plugin for Charts and Graphs suffers from a Cross-Site Request Forgery (CSRF) vulnerability identified as CVE-2025-14615, classified under CWE-352. This vulnerability exists in all versions up to and including 1.5.7 due to the absence of nonce validation in the settings handler located in dashboardbuilder-admin.php. Nonce validation is a critical security control in WordPress to prevent unauthorized state-changing requests. Because this validation is missing, an attacker can craft a malicious request that, when an authenticated site administrator unknowingly triggers (e.g., by clicking a link), causes the plugin to update its stored SQL query and database credentials. The plugin uses these stored queries to generate charts and graphs via the [show-dashboardbuilder] shortcode. By modifying these queries, the attacker can inject arbitrary SQL commands, which are executed on the front-end when the shortcode renders. This leads to SQL injection, allowing unauthorized data access and exfiltration through the publicly visible chart output. The vulnerability requires user interaction (the administrator must trigger the forged request) but does not require the attacker to be authenticated. The CVSS v3.1 base score is 7.1, reflecting high severity due to network attack vector, low attack complexity, no privileges required, user interaction needed, and high confidentiality impact. Integrity impact is low, and availability is unaffected. No patches or exploits are currently publicly available, but the risk remains significant given the plugin's functionality and the potential for sensitive data leakage.

Potential Impact

This vulnerability poses a significant risk to organizations using the DASHBOARD BUILDER WordPress plugin, especially those displaying sensitive or proprietary data via charts and graphs. Successful exploitation can lead to unauthorized modification of SQL queries and database credentials, resulting in arbitrary SQL injection attacks. This can compromise the confidentiality of the underlying database by exposing sensitive information through the plugin's front-end output. Data exfiltration through publicly visible charts can lead to data breaches, regulatory non-compliance, and reputational damage. Since the attack requires tricking an administrator, organizations with less security-aware admins or lacking multi-factor authentication are at higher risk. The integrity of the data is partially impacted due to possible query manipulation, but availability remains unaffected. The vulnerability could be leveraged as a foothold for further attacks if database credentials are altered or exposed. Overall, the threat affects the confidentiality and integrity of data and could have severe consequences for organizations relying on this plugin for business intelligence or reporting.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement the following specific actions: 1) Disable or remove the DASHBOARD BUILDER plugin until a patched version is released. 2) Monitor and restrict administrator access to trusted personnel only, minimizing the risk of social engineering. 3) Educate administrators about the risks of clicking unknown or suspicious links, especially when logged into WordPress admin. 4) Implement Web Application Firewall (WAF) rules to detect and block suspicious POST requests targeting dashboardbuilder-admin.php or related endpoints. 5) Audit and review all stored SQL queries and database credentials configured in the plugin for unauthorized changes. 6) If possible, isolate the plugin's database user with minimal privileges to limit the impact of SQL injection. 7) Regularly back up WordPress site data and configurations to enable recovery from potential compromise. 8) Monitor logs for unusual activity related to the plugin's shortcode rendering or admin settings changes. 9) Once available, promptly apply official patches or updates from the plugin vendor addressing nonce validation. 10) Consider implementing Content Security Policy (CSP) and other browser-side protections to reduce the risk of CSRF attacks. These targeted measures go beyond generic advice by focusing on the plugin's specific attack vectors and operational context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T20:47:27.527Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fe2

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 2/27/2026, 11:28:08 AM

Last updated: 3/24/2026, 12:27:38 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses