CVE-2025-3491: CWE-94 Improper Control of Generation of Code ('Code Injection') in kiranpatil353 Add custom page template
The Add custom page template plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.0.1 via the 'acpt_validate_setting' function. This is due to insufficient sanitization of the 'template_name' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
AI Analysis
Technical Summary
CVE-2025-3491 is a high-severity vulnerability affecting the WordPress plugin 'Add custom page template' developed by kiranpatil353, specifically all versions up to and including 2.0.1. The vulnerability arises from improper sanitization of the 'template_name' parameter within the 'acpt_validate_setting' function, leading to PHP code injection (CWE-94). This flaw allows an authenticated attacker with Administrator-level privileges or higher to inject and execute arbitrary PHP code on the server hosting the WordPress site. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation can lead to full system compromise, data theft, defacement, or denial of service. Although no public exploits have been observed in the wild yet, the presence of this vulnerability in a widely used CMS plugin poses a significant risk. The lack of available patches at the time of publication further increases exposure. The vulnerability is classified under CWE-94, indicating improper control over code generation, a critical security weakness in web applications that handle dynamic code execution. Given the nature of WordPress plugins, this vulnerability can be leveraged to pivot attacks within the hosting environment, potentially affecting other applications or data stored on the same server.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on WordPress for their web presence, including e-commerce, government portals, and corporate websites. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, website defacement, or disruption of online services. Given the high privileges required, insider threats or compromised administrator accounts are the primary vectors, but phishing or credential theft could facilitate such access. The impact extends beyond individual sites, as compromised servers can be used as launchpads for further attacks, including lateral movement within corporate networks or distribution of malware. The reputational damage and regulatory consequences under GDPR for data breaches could be severe. Additionally, sectors with critical infrastructure or public-facing services are at heightened risk due to potential service outages or manipulation of information.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the 'Add custom page template' plugin and verify its version. Since no official patch is currently available, temporary mitigations include disabling or uninstalling the plugin until a secure update is released. Restricting administrator access through strict role management and enforcing multi-factor authentication (MFA) can reduce the risk of credential compromise. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'template_name' parameter can provide additional protection. Regular monitoring of server logs for unusual PHP execution or unexpected changes in template files is recommended. Organizations should also ensure that backups are current and tested to enable rapid recovery in case of compromise. Finally, maintaining an incident response plan that includes procedures for web server compromise will improve readiness.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-3491: CWE-94 Improper Control of Generation of Code ('Code Injection') in kiranpatil353 Add custom page template
Description
The Add custom page template plugin for WordPress is vulnerable to PHP Code Injection leading to Remote Code Execution in all versions up to, and including, 2.0.1 via the 'acpt_validate_setting' function. This is due to insufficient sanitization of the 'template_name' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
AI-Powered Analysis
Technical Analysis
CVE-2025-3491 is a high-severity vulnerability affecting the WordPress plugin 'Add custom page template' developed by kiranpatil353, specifically all versions up to and including 2.0.1. The vulnerability arises from improper sanitization of the 'template_name' parameter within the 'acpt_validate_setting' function, leading to PHP code injection (CWE-94). This flaw allows an authenticated attacker with Administrator-level privileges or higher to inject and execute arbitrary PHP code on the server hosting the WordPress site. The vulnerability is remotely exploitable over the network (AV:N) with low attack complexity (AC:L), requiring high privileges (PR:H) but no user interaction (UI:N). The impact on confidentiality, integrity, and availability is high, as successful exploitation can lead to full system compromise, data theft, defacement, or denial of service. Although no public exploits have been observed in the wild yet, the presence of this vulnerability in a widely used CMS plugin poses a significant risk. The lack of available patches at the time of publication further increases exposure. The vulnerability is classified under CWE-94, indicating improper control over code generation, a critical security weakness in web applications that handle dynamic code execution. Given the nature of WordPress plugins, this vulnerability can be leveraged to pivot attacks within the hosting environment, potentially affecting other applications or data stored on the same server.
Potential Impact
For European organizations, this vulnerability presents a substantial risk, especially for those relying on WordPress for their web presence, including e-commerce, government portals, and corporate websites. Exploitation could lead to unauthorized access to sensitive customer data, intellectual property theft, website defacement, or disruption of online services. Given the high privileges required, insider threats or compromised administrator accounts are the primary vectors, but phishing or credential theft could facilitate such access. The impact extends beyond individual sites, as compromised servers can be used as launchpads for further attacks, including lateral movement within corporate networks or distribution of malware. The reputational damage and regulatory consequences under GDPR for data breaches could be severe. Additionally, sectors with critical infrastructure or public-facing services are at heightened risk due to potential service outages or manipulation of information.
Mitigation Recommendations
Organizations should immediately audit their WordPress installations to identify the presence of the 'Add custom page template' plugin and verify its version. Since no official patch is currently available, temporary mitigations include disabling or uninstalling the plugin until a secure update is released. Restricting administrator access through strict role management and enforcing multi-factor authentication (MFA) can reduce the risk of credential compromise. Implementing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the 'template_name' parameter can provide additional protection. Regular monitoring of server logs for unusual PHP execution or unexpected changes in template files is recommended. Organizations should also ensure that backups are current and tested to enable rapid recovery in case of compromise. Finally, maintaining an incident response plan that includes procedures for web server compromise will improve readiness.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-10T00:05:32.738Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983dc4522896dcbef798
Added to database: 5/21/2025, 9:09:17 AM
Last enriched: 6/24/2025, 7:20:20 PM
Last updated: 7/26/2025, 3:19:02 AM
Views: 14
Related Threats
CVE-2025-8842: Use After Free in NASM Netwide Assember
MediumResearchers Detail Windows EPM Poisoning Exploit Chain Leading to Domain Privilege Escalation
HighCVE-2025-8841: Unrestricted Upload in zlt2000 microservices-platform
MediumCVE-2025-8840: Improper Authorization in jshERP
MediumCVE-2025-8853: CWE-290 Authentication Bypass by Spoofing in 2100 Technology Official Document Management System
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.