Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14741: CWE-862 Missing Authorization in shabti Frontend Admin by DynamiApps

0
Critical
VulnerabilityCVE-2025-14741cvecve-2025-14741cwe-862
Published: Fri Jan 09 2026 (01/09/2026, 07:22:11 UTC)
Source: CVE Database V5
Vendor/Project: shabti
Product: Frontend Admin by DynamiApps

Description

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to missing authorization to unauthorized data modification and deletion due to a missing capability check on the 'delete_object' function in all versions up to, and including, 3.28.25. This makes it possible for unauthenticated attackers to delete arbitrary posts, pages, products, taxonomy terms, and user accounts.

AI-Powered Analysis

AILast updated: 01/09/2026, 07:56:51 UTC

Technical Analysis

CVE-2025-14741 is a critical security vulnerability identified in the Frontend Admin by DynamiApps plugin for WordPress, affecting all versions up to 3.28.25. The vulnerability arises from a missing authorization check (CWE-862) on the 'delete_object' function, which is responsible for deleting various WordPress objects such as posts, pages, products, taxonomy terms, and user accounts. Due to the absence of a capability check, unauthenticated attackers can invoke this function remotely without any credentials or user interaction, enabling them to delete arbitrary content and user accounts. This flaw compromises the integrity and availability of the affected WordPress sites, potentially leading to data loss, disruption of services, and administrative account deletion. The vulnerability has a CVSS v3.1 base score of 9.1, reflecting its critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits have been reported yet, the vulnerability's nature and ease of exploitation make it a high-risk threat. The plugin is widely used in WordPress environments, including e-commerce and content management systems, increasing the potential attack surface. The lack of an official patch at the time of reporting necessitates immediate interim mitigations to reduce risk.

Potential Impact

For European organizations, the impact of CVE-2025-14741 can be severe. Organizations relying on WordPress sites with the vulnerable plugin risk unauthorized deletion of critical content and user accounts, leading to loss of business data, disruption of online services, and potential reputational damage. E-commerce platforms could suffer from product data deletion, affecting sales and customer trust. The deletion of user accounts could also disrupt administrative control and user access, complicating recovery efforts. Given the vulnerability requires no authentication, attackers can exploit it remotely at scale, increasing the risk of widespread attacks. This could lead to downtime, financial losses, and regulatory compliance issues, especially under GDPR where data integrity and availability are critical. The threat is particularly relevant for sectors such as retail, media, education, and government agencies that use WordPress extensively for public-facing websites and internal portals.

Mitigation Recommendations

1. Monitor official channels from DynamiApps and WordPress for the release of a security patch and apply it immediately upon availability. 2. Until a patch is released, restrict access to the WordPress admin interface and plugin files using web application firewalls (WAFs) and IP whitelisting to limit exposure. 3. Implement strict file and directory permissions on the WordPress installation to prevent unauthorized modifications. 4. Enable detailed logging and monitoring of deletion events and unusual administrative activities to detect potential exploitation attempts early. 5. Regularly back up WordPress databases and files, ensuring backups are stored securely and tested for restoration to minimize data loss impact. 6. Consider temporarily disabling or removing the Frontend Admin by DynamiApps plugin if it is not essential to operations. 7. Educate site administrators about the vulnerability and encourage vigilance for suspicious activity. 8. Employ security plugins that can add additional authorization checks or alert on unauthorized deletions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-15T19:08:42.013Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b130ecefc3cd7c0f7d11

Added to database: 1/9/2026, 7:41:36 AM

Last enriched: 1/9/2026, 7:56:51 AM

Last updated: 1/9/2026, 11:53:48 PM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats