CVE-2025-3491: CWE-94 Improper Control of Generation of Code ('Code Injection') in kiranpatil353 Add custom page template
The Add custom page template plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.0.1 via the 'acpt_validate_setting' function. This is due to insufficient sanitization of the 'template_name' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
AI Analysis
Technical Summary
CVE-2025-3491 is a high-severity vulnerability affecting the WordPress plugin 'Add custom page template' developed by kiranpatil353, specifically all versions up to and including 2.0.1. The vulnerability arises from improper sanitization of the 'template_name' parameter within the 'acpt_validate_setting' function, leading to PHP code injection (CWE-94). This flaw allows an authenticated attacker with Administrator-level privileges or higher to inject and execute arbitrary PHP code on the server hosting the WordPress site. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation can lead to full system compromise, data theft, defacement, or denial of service. Although no public exploits have been observed in the wild yet, the presence of this vulnerability in a widely used CMS plugin poses a significant risk. The lack of available patches at the time of publication further increases exposure. The vulnerability is classified under CWE-94, indicating improper control over code generation, a critical security weakness in web applications that handle dynamic code execution. Given the nature of WordPress plugins, this vulnerability can be leveraged to pivot attacks within the hosting environment, potentially affecting other applications or data stored on the same server.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on WordPress for their web presence, including e-commerce, government portals, and corporate websites. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, website defacement, or disruption of online services. Given the high privileges required, insider threats or compromised administrator accounts are the primary vectors, but phishing or credential theft could facilitate such access. The impact extends beyond individual sites, as compromised servers can be used as launchpads for further attacks, including lateral movement within corporate networks or distribution of malware. The reputational damage and regulatory consequences under GDPR for data breaches could be severe. Additionally, sectors with critical infrastructure or public-facing services are at heightened risk due to potential service outages or manipulation of information.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the 'Add custom page template' plugin and verify its version. Since no official patch is currently available, temporary mitigations include disabling or uninstalling the plugin until a secure update is released. Restricting administrator access through strict role management and enforcing multi-factor authentication (MFA) can reduce the risk of credential compromise. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'template_name' parameter can provide additional protection. Regular monitoring of server logs for unusual PHP execution or unexpected changes in template files is recommended. Organizations should also ensure that backups are current and tested to enable rapid recovery in case of compromise. Finally, maintaining an incident response plan that includes procedures for web server compromise will improve readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3491: CWE-94 Improper Control of Generation of Code ('Code Injection') in kiranpatil353 Add custom page template
Description
The Add custom page template plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.0.1 via the 'acpt_validate_setting' function. This is due to insufficient sanitization of the 'template_name' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-3491 is a high-severity vulnerability affecting the WordPress plugin 'Add custom page template' developed by kiranpatil353, specifically all versions up to and including 2.0.1. The vulnerability arises from improper sanitization of the 'template_name' parameter within the 'acpt_validate_setting' function, leading to PHP code injection (CWE-94). This flaw allows an authenticated attacker with Administrator-level privileges or higher to inject and execute arbitrary PHP code on the server hosting the WordPress site. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation can lead to full system compromise, data theft, defacement, or denial of service. Although no public exploits have been observed in the wild yet, the presence of this vulnerability in a widely used CMS plugin poses a significant risk. The lack of available patches at the time of publication further increases exposure. The vulnerability is classified under CWE-94, indicating improper control over code generation, a critical security weakness in web applications that handle dynamic code execution. Given the nature of WordPress plugins, this vulnerability can be leveraged to pivot attacks within the hosting environment, potentially affecting other applications or data stored on the same server.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on WordPress for their web presence, including e-commerce, government portals, and corporate websites. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, website defacement, or disruption of online services. Given the high privileges required, insider threats or compromised administrator accounts are the primary vectors, but phishing or credential theft could facilitate such access. The impact extends beyond individual sites, as compromised servers can be used as launchpads for further attacks, including lateral movement within corporate networks or distribution of malware. The reputational damage and regulatory consequences under GDPR for data breaches could be severe. Additionally, sectors with critical infrastructure or public-facing services are at heightened risk due to potential service outages or manipulation of information.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the 'Add custom page template' plugin and verify its version. Since no official patch is currently available, temporary mitigations include disabling or uninstalling the plugin until a secure update is released. Restricting administrator access through strict role management and enforcing multi-factor authentication (MFA) can reduce the risk of credential compromise. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'template_name' parameter can provide additional protection. Regular monitoring of server logs for unusual PHP execution or unexpected changes in template files is recommended. Organizations should also ensure that backups are current and tested to enable rapid recovery in case of compromise. Finally, maintaining an incident response plan that includes procedures for web server compromise will improve readiness.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-10T00:05:32.738Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef798
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 7:20:20 PM
Last updated: 1/7/2026, 8:57:13 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.