CVE-2025-52756: Improper Control of Generation of Code ('Code Injection') in Sayan Datta WP Last Modified Info
Improper Control of Generation of Code ('Code Injection') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Remote Code Inclusion.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.
AI Analysis
Technical Summary
CVE-2025-52756 is a vulnerability classified as 'Improper Control of Generation of Code' or code injection in the WordPress plugin 'WP Last Modified Info' developed by Sayan Datta. The affected versions include all releases up to and including 1.9.2. This vulnerability allows an attacker with at least low privileges (PR:L) to remotely include and execute arbitrary code on the target system without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur over the internet. The vulnerability results in a partial impact on confidentiality, integrity, and availability (C:L/I:L/A:L), indicating that while the attacker may not gain full control, they can compromise sensitive data, alter information, or disrupt service. The vulnerability scope is changed (S:C), suggesting that the attack can affect components beyond the initially vulnerable plugin, potentially impacting the entire WordPress installation or underlying server environment. No known public exploits have been reported yet, but the presence of this vulnerability in a widely used WordPress plugin poses a significant risk. The lack of available patches at the time of publication increases the urgency for monitoring and mitigation. The vulnerability arises from insufficient validation or sanitization of inputs that are used to generate code dynamically, allowing remote code inclusion attacks. This can lead to execution of arbitrary PHP code, which attackers can leverage to escalate privileges, deploy malware, or pivot within the network.
Potential Impact
For European organizations, the impact of CVE-2025-52756 can be substantial, particularly for those relying on WordPress for their web presence. Successful exploitation could lead to unauthorized code execution, data leakage, defacement of websites, or service disruption. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and incur financial losses due to downtime or remediation costs. Organizations with public-facing WordPress sites are especially vulnerable as the attack vector is network accessible. The partial compromise of confidentiality, integrity, and availability means attackers could manipulate content, inject malicious scripts, or disrupt services, impacting customer trust and business continuity. Given the plugin’s role in displaying last modified information, attackers might also use this as a foothold to escalate attacks or spread malware within the hosting environment. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates a strong potential for exploitation once weaponized.
Mitigation Recommendations
1. Monitor official sources and the plugin vendor for patches or updates addressing CVE-2025-52756 and apply them immediately upon release. 2. Until a patch is available, consider temporarily disabling the WP Last Modified Info plugin or replacing it with a secure alternative that does not have this vulnerability. 3. Conduct a thorough code review of the plugin’s usage in your environment to identify and restrict any inputs that could lead to code injection, implementing strict input validation and sanitization. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable plugin endpoints. 5. Limit WordPress user privileges to the minimum necessary, as exploitation requires low privileges; reducing user permissions can mitigate risk. 6. Regularly audit WordPress installations and server logs for unusual activity indicative of attempted exploitation. 7. Harden the hosting environment by disabling PHP execution in directories where it is not required, especially upload folders. 8. Implement network segmentation and monitoring to detect lateral movement in case of compromise. 9. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-52756: Improper Control of Generation of Code ('Code Injection') in Sayan Datta WP Last Modified Info
Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Sayan Datta WP Last Modified Info wp-last-modified-info allows Remote Code Inclusion.This issue affects WP Last Modified Info: from n/a through <= 1.9.2.
AI-Powered Analysis
Technical Analysis
CVE-2025-52756 is a vulnerability classified as 'Improper Control of Generation of Code' or code injection in the WordPress plugin 'WP Last Modified Info' developed by Sayan Datta. The affected versions include all releases up to and including 1.9.2. This vulnerability allows an attacker with at least low privileges (PR:L) to remotely include and execute arbitrary code on the target system without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur over the internet. The vulnerability results in a partial impact on confidentiality, integrity, and availability (C:L/I:L/A:L), indicating that while the attacker may not gain full control, they can compromise sensitive data, alter information, or disrupt service. The vulnerability scope is changed (S:C), suggesting that the attack can affect components beyond the initially vulnerable plugin, potentially impacting the entire WordPress installation or underlying server environment. No known public exploits have been reported yet, but the presence of this vulnerability in a widely used WordPress plugin poses a significant risk. The lack of available patches at the time of publication increases the urgency for monitoring and mitigation. The vulnerability arises from insufficient validation or sanitization of inputs that are used to generate code dynamically, allowing remote code inclusion attacks. This can lead to execution of arbitrary PHP code, which attackers can leverage to escalate privileges, deploy malware, or pivot within the network.
Potential Impact
For European organizations, the impact of CVE-2025-52756 can be substantial, particularly for those relying on WordPress for their web presence. Successful exploitation could lead to unauthorized code execution, data leakage, defacement of websites, or service disruption. This can damage organizational reputation, lead to regulatory non-compliance (e.g., GDPR breaches if personal data is exposed), and incur financial losses due to downtime or remediation costs. Organizations with public-facing WordPress sites are especially vulnerable as the attack vector is network accessible. The partial compromise of confidentiality, integrity, and availability means attackers could manipulate content, inject malicious scripts, or disrupt services, impacting customer trust and business continuity. Given the plugin’s role in displaying last modified information, attackers might also use this as a foothold to escalate attacks or spread malware within the hosting environment. The absence of known exploits in the wild currently provides a window for proactive defense, but the high CVSS score indicates a strong potential for exploitation once weaponized.
Mitigation Recommendations
1. Monitor official sources and the plugin vendor for patches or updates addressing CVE-2025-52756 and apply them immediately upon release. 2. Until a patch is available, consider temporarily disabling the WP Last Modified Info plugin or replacing it with a secure alternative that does not have this vulnerability. 3. Conduct a thorough code review of the plugin’s usage in your environment to identify and restrict any inputs that could lead to code injection, implementing strict input validation and sanitization. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable plugin endpoints. 5. Limit WordPress user privileges to the minimum necessary, as exploitation requires low privileges; reducing user permissions can mitigate risk. 6. Regularly audit WordPress installations and server logs for unusual activity indicative of attempted exploitation. 7. Harden the hosting environment by disabling PHP execution in directories where it is not required, especially upload folders. 8. Implement network segmentation and monitoring to detect lateral movement in case of compromise. 9. Educate site administrators about the risks of installing unverified plugins and the importance of timely updates.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-06-19T10:02:55.536Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68f8eff004677bbd79439911
Added to database: 10/22/2025, 2:53:36 PM
Last enriched: 11/13/2025, 11:23:36 AM
Last updated: 12/14/2025, 10:09:45 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14653: SQL Injection in itsourcecode Student Management System
MediumCVE-2025-14652: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14651: Use of Hard-coded Cryptographic Key in MartialBE one-hub
MediumCVE-2025-14650: SQL Injection in itsourcecode Online Cake Ordering System
MediumCVE-2025-14649: SQL Injection in itsourcecode Online Cake Ordering System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.