Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14736: CWE-269 Improper Privilege Management in shabti Frontend Admin by DynamiApps

0
Critical
VulnerabilityCVE-2025-14736cvecve-2025-14736cwe-269
Published: Fri Jan 09 2026 (01/09/2026, 06:34:51 UTC)
Source: CVE Database V5
Vendor/Project: shabti
Product: Frontend Admin by DynamiApps

Description

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.28.25. This is due to insufficient validation of user-supplied role values in the 'validate_value', 'pre_update_value', and 'get_fields_display' functions. This makes it possible for unauthenticated attackers to register as administrators and gain complete control of the site, granted they can access a user registration form containing a Role field.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:32:36 UTC

Technical Analysis

CVE-2025-14736 is a critical security vulnerability classified under CWE-269 (Improper Privilege Management) found in the Frontend Admin by DynamiApps plugin for WordPress. This plugin, widely used to manage frontend administrative tasks, suffers from insufficient validation of user-supplied role values within the 'validate_value', 'pre_update_value', and 'get_fields_display' functions. Specifically, these functions fail to properly verify or sanitize the role parameter submitted during user registration or profile updates. As a result, an unauthenticated attacker who can access a user registration form containing a Role field can manipulate this field to assign themselves an administrator role. This privilege escalation bypasses all authentication and authorization controls, granting the attacker full administrative control over the WordPress site. The vulnerability affects all versions up to and including 3.28.25. The CVSS 3.1 base score is 9.8, indicating critical severity with network attack vector, no required privileges or user interaction, and full impact on confidentiality, integrity, and availability. Although no exploits have been publicly reported yet, the ease of exploitation and potential damage make this a high-risk vulnerability. The lack of patch links suggests that a fix may not yet be available, increasing urgency for mitigation. This vulnerability could be leveraged to deface websites, steal sensitive data, install malware, or disrupt services.

Potential Impact

The impact of CVE-2025-14736 is severe for organizations running WordPress sites with the vulnerable Frontend Admin by DynamiApps plugin. Successful exploitation results in complete site takeover by unauthorized attackers without needing authentication or user interaction. This compromises confidentiality by exposing sensitive data stored or processed by the site, integrity by allowing attackers to modify or delete content and configurations, and availability by enabling disruptive actions such as site defacement or denial of service. For e-commerce, government, or enterprise sites, this could lead to financial loss, reputational damage, regulatory penalties, and operational disruption. The vulnerability's network accessibility and lack of required privileges make it highly exploitable, increasing the likelihood of widespread attacks once exploit code becomes available. Organizations globally that rely on this plugin face significant risk, especially those with publicly accessible user registration forms containing role fields.

Mitigation Recommendations

Organizations should immediately audit their WordPress installations to identify the presence of the Frontend Admin by DynamiApps plugin and its version. If the plugin is installed and vulnerable (version 3.28.25 or earlier), they should disable or remove it until a vendor patch is released. In the absence of an official patch, administrators can mitigate risk by removing or restricting access to any user registration forms that include a Role field, ensuring that role assignment is handled only by trusted administrators within the backend. Additionally, implement web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate role parameters during registration or profile updates. Monitoring logs for unusual user creation or privilege escalation attempts is critical. Organizations should also enforce the principle of least privilege on all user roles and regularly review user accounts for unauthorized administrators. Finally, maintain up-to-date backups and have an incident response plan ready in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-15T18:33:44.721Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960a320ecefc3cd7c0b982e

Added to database: 1/9/2026, 6:41:36 AM

Last enriched: 2/27/2026, 11:32:36 AM

Last updated: 3/24/2026, 12:10:41 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses