Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14937: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shabti Frontend Admin by DynamiApps

0
High
VulnerabilityCVE-2025-14937cvecve-2025-14937cwe-79
Published: Fri Jan 09 2026 (01/09/2026, 07:22:10 UTC)
Source: CVE Database V5
Vendor/Project: shabti
Product: Frontend Admin by DynamiApps

Description

CVE-2025-14937 is a high-severity stored Cross-Site Scripting (XSS) vulnerability in the Frontend Admin by DynamiApps WordPress plugin affecting all versions up to 3. 28. 23. It allows unauthenticated attackers to inject malicious scripts via the 'acff' parameter in an AJAX action, which execute when users access the compromised pages. This vulnerability does not require user interaction or authentication and impacts confidentiality and integrity with a CVSS score of 7. 2. There are no known exploits in the wild yet, but the vulnerability's nature and ease of exploitation make it a significant risk. European organizations using this plugin on WordPress sites, especially those with public-facing administrative interfaces, are at risk. Mitigation requires immediate plugin updates or applying custom input sanitization and output escaping. Countries with high WordPress adoption and significant digital services, such as Germany, France, and the UK, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:59:33 UTC

Technical Analysis

CVE-2025-14937 is a stored Cross-Site Scripting (XSS) vulnerability identified in the Frontend Admin by DynamiApps plugin for WordPress, affecting all versions up to and including 3.28.23. The vulnerability arises from improper neutralization of input during web page generation, specifically insufficient sanitization and escaping of the 'acff' parameter in the 'frontend_admin/forms/update_field' AJAX action. This flaw allows unauthenticated attackers to inject arbitrary JavaScript code that is stored persistently and executed whenever any user accesses the affected page. Because the attack vector is unauthenticated and requires no user interaction, it significantly lowers the barrier for exploitation. The vulnerability impacts the confidentiality and integrity of user data by enabling theft of session cookies, credentials, or execution of unauthorized actions in the context of the victim’s browser. The CVSS v3.1 base score is 7.2, reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a scope change due to the potential compromise of other users. No official patches or exploit code are currently available, but the vulnerability is publicly disclosed and documented by Wordfence. The plugin is widely used in WordPress environments to manage frontend administrative forms, making this a critical concern for websites relying on it for content or user management.

Potential Impact

For European organizations, this vulnerability poses a significant risk to websites using the Frontend Admin by DynamiApps plugin, especially those with public-facing administrative interfaces or user dashboards. Exploitation can lead to unauthorized disclosure of sensitive information such as session tokens, personal data, or administrative credentials, potentially resulting in account takeover or further compromise of internal systems. The stored nature of the XSS means that multiple users can be affected over time, increasing the attack surface. This can damage organizational reputation, lead to regulatory non-compliance under GDPR due to data breaches, and disrupt business operations. Sectors with high reliance on WordPress for customer interaction, such as e-commerce, media, and public services, are particularly vulnerable. The lack of required authentication and user interaction makes it easier for attackers to exploit at scale, increasing the likelihood of widespread impact across European digital infrastructure.

Mitigation Recommendations

Immediate mitigation involves updating the Frontend Admin by DynamiApps plugin to a version that addresses this vulnerability once released by the vendor. Until an official patch is available, organizations should implement strict input validation and output encoding on the 'acff' parameter within the AJAX action to neutralize malicious scripts. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting this parameter can reduce risk. Administrators should audit existing content for injected scripts and remove any malicious code. Additionally, enforcing Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting script execution sources. Regular security scanning and monitoring for anomalous activities related to this plugin are recommended. Finally, educating users and administrators about the risks of XSS and maintaining strong session management practices will help limit damage from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-18T21:15:38.790Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b130ecefc3cd7c0f7d15

Added to database: 1/9/2026, 7:41:36 AM

Last enriched: 1/16/2026, 9:59:33 AM

Last updated: 2/7/2026, 6:55:05 AM

Views: 37

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats