Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14736: CWE-269 Improper Privilege Management in shabti Frontend Admin by DynamiApps

0
Critical
VulnerabilityCVE-2025-14736cvecve-2025-14736cwe-269
Published: Fri Jan 09 2026 (01/09/2026, 06:34:51 UTC)
Source: CVE Database V5
Vendor/Project: shabti
Product: Frontend Admin by DynamiApps

Description

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 3.28.25. This is due to insufficient validation of user-supplied role values in the 'validate_value', 'pre_update_value', and 'get_fields_display' functions. This makes it possible for unauthenticated attackers to register as administrators and gain complete control of the site, granted they can access a user registration form containing a Role field.

AI-Powered Analysis

AILast updated: 01/09/2026, 06:56:37 UTC

Technical Analysis

CVE-2025-14736 is a critical vulnerability identified in the Frontend Admin by DynamiApps plugin for WordPress, affecting all versions up to and including 3.28.25. The root cause is improper privilege management (CWE-269) due to insufficient validation of user-supplied role values within the 'validate_value', 'pre_update_value', and 'get_fields_display' functions. This flaw allows an unauthenticated attacker to exploit a user registration form that includes a Role field to assign themselves the administrator role during registration. Because the vulnerability requires no authentication or user interaction, it enables a direct privilege escalation to full administrative control over the WordPress site. The CVSS v3.1 score of 9.8 reflects the vulnerability's critical nature, with network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the ease of exploitation and potential impact make this a severe threat. The vulnerability compromises the core security model of WordPress sites using this plugin, potentially leading to site defacement, data theft, malware deployment, or complete site takeover.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those relying on WordPress sites with the Frontend Admin by DynamiApps plugin installed and user registration enabled. Attackers can gain full administrative privileges without authentication, leading to complete site compromise. This can result in data breaches involving sensitive customer or business data, disruption of services through defacement or denial of service, and use of compromised sites as platforms for further attacks such as phishing or malware distribution. Organizations in sectors with high regulatory requirements, such as finance, healthcare, and government, face additional compliance and reputational risks. The public-facing nature of many WordPress sites in Europe increases exposure, particularly if registration forms are accessible and not restricted. The lack of current known exploits provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting access to user registration forms that allow role assignment until a patch is available. Administrators should audit their WordPress installations to identify the presence of the Frontend Admin by DynamiApps plugin and verify if user registration with role selection is enabled. Implementing Web Application Firewall (WAF) rules to block suspicious registration attempts or requests containing role parameters can reduce risk. Monitoring logs for unusual registration activity or privilege escalations is essential. Once the vendor releases a patch, prompt application is critical. Additionally, organizations should enforce the principle of least privilege by limiting the roles available for assignment during registration and consider alternative user management workflows that do not expose role parameters to unauthenticated users. Regular backups and incident response plans should be updated to address potential exploitation scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-15T18:33:44.721Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960a320ecefc3cd7c0b982e

Added to database: 1/9/2026, 6:41:36 AM

Last enriched: 1/9/2026, 6:56:37 AM

Last updated: 1/9/2026, 11:54:00 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats