CVE-2025-14937: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shabti Frontend Admin by DynamiApps
CVE-2025-14937 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Frontend Admin by DynamiApps WordPress plugin affecting all versions up to 3. 28. 23. It allows unauthenticated attackers to inject malicious scripts via the 'acff' parameter in an AJAX action, which execute when users access the compromised pages. This vulnerability does not require user interaction or authentication and impacts confidentiality and integrity with a CVSS score of 7. 2. There are no known exploits in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk. European organizations using this plugin on WordPress sites, especially those with public-facing administrative interfaces, are at risk. Mitigation requires immediate plugin updates or applying custom input sanitization and output escaping. Countries with high WordPress adoption and significant digital services, such as Germany, France, and the UK, are most likely to be affected.
AI Analysis
Technical Summary
CVE-2025-14937 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Frontend Admin by DynamiApps plugin for WordPress, affecting all versions up to and including 3.28.23. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'acff' parameter in the 'frontend_admin/forms/update_field' AJAX action. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed whenever any user accesses the affected page. Because the attack vector is unauthenticated and requires no user interaction, it significantly lowers the barrier for exploitation. The vulnerability impacts the confidentiality and integrity of user data by enabling theft of session cookies, credentials, or execution of unauthorized actions in the context of the victim’s browser. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to the potential compromise of other users. No official patches or exploit code are currently available, but the vulnerability is publicly disclosed and documented by Wordfence. The plugin is widely used in WordPress environments to manage frontend administrative forms, making this a critical concern for websites relying on it for content or user management.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Frontend Admin by DynamiApps plugin, especially those with public-facing administrative interfaces or user dashboards. Exploitation can lead to unauthorized disclosure of sensitive information such as session tokens, personal data, or administrative credentials, potentially resulting in account takeover or further compromise of internal systems. The stored nature of the XSS means that multiple users can be affected over time, increasing the attack surface. This can damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and disrupt business operations. Sectors with high reliance on WordPress for customer interaction, such as e-commerce, media, and public services, are particularly vulnerable. The lack of required authentication and user interaction makes it easier for attackers to exploit at scale, increasing the likelihood of widespread impact across European digital infrastructure.
Mitigation Recommendations
Immediate mitigation involves updating the Frontend Admin by DynamiApps plugin to a version that addresses this vulnerability once released by the vendor. Until an official patch is available, organizations should implement strict input validation and output encoding on the 'acff' parameter within the AJAX action to neutralize malicious scripts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this parameter can reduce risk. Administrators should audit existing content for injected scripts and remove any malicious code. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regular security scanning and monitoring for anomalous activities related to this plugin are recommended. Finally, educating users and administrators about the risks of XSS and maintaining strong session management practices will help limit damage from potential exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-14937: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shabti Frontend Admin by DynamiApps
Description
CVE-2025-14937 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Frontend Admin by DynamiApps WordPress plugin affecting all versions up to 3. 28. 23. It allows unauthenticated attackers to inject malicious scripts via the 'acff' parameter in an AJAX action, which execute when users access the compromised pages. This vulnerability does not require user interaction or authentication and impacts confidentiality and integrity with a CVSS score of 7. 2. There are no known exploits in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk. European organizations using this plugin on WordPress sites, especially those with public-facing administrative interfaces, are at risk. Mitigation requires immediate plugin updates or applying custom input sanitization and output escaping. Countries with high WordPress adoption and significant digital services, such as Germany, France, and the UK, are most likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-14937 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Frontend Admin by DynamiApps plugin for WordPress, affecting all versions up to and including 3.28.23. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'acff' parameter in the 'frontend_admin/forms/update_field' AJAX action. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed whenever any user accesses the affected page. Because the attack vector is unauthenticated and requires no user interaction, it significantly lowers the barrier for exploitation. The vulnerability impacts the confidentiality and integrity of user data by enabling theft of session cookies, credentials, or execution of unauthorized actions in the context of the victim’s browser. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to the potential compromise of other users. No official patches or exploit code are currently available, but the vulnerability is publicly disclosed and documented by Wordfence. The plugin is widely used in WordPress environments to manage frontend administrative forms, making this a critical concern for websites relying on it for content or user management.
Potential Impact
For European organizations, this vulnerability poses a significant risk to websites using the Frontend Admin by DynamiApps plugin, especially those with public-facing administrative interfaces or user dashboards. Exploitation can lead to unauthorized disclosure of sensitive information such as session tokens, personal data, or administrative credentials, potentially resulting in account takeover or further compromise of internal systems. The stored nature of the XSS means that multiple users can be affected over time, increasing the attack surface. This can damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and disrupt business operations. Sectors with high reliance on WordPress for customer interaction, such as e-commerce, media, and public services, are particularly vulnerable. The lack of required authentication and user interaction makes it easier for attackers to exploit at scale, increasing the likelihood of widespread impact across European digital infrastructure.
Mitigation Recommendations
Immediate mitigation involves updating the Frontend Admin by DynamiApps plugin to a version that addresses this vulnerability once released by the vendor. Until an official patch is available, organizations should implement strict input validation and output encoding on the 'acff' parameter within the AJAX action to neutralize malicious scripts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this parameter can reduce risk. Administrators should audit existing content for injected scripts and remove any malicious code. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regular security scanning and monitoring for anomalous activities related to this plugin are recommended. Finally, educating users and administrators about the risks of XSS and maintaining strong session management practices will help limit damage from potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-18T21:15:38.790Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960b130ecefc3cd7c0f7d15
Added to database: 1/9/2026, 7:41:36 AM
Last enriched: 1/16/2026, 9:59:33 AM
Last updated: 2/7/2026, 10:44:31 AM
Views: 38
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.