Cyber Posture

CVE-2025-14502

Critical

Published: 14 January 2026

Published
14 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0058 69.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

The News and Blog Designer Bundle plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1 via the template parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php…

more

files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Implements input validation on the 'template' parameter to block path traversal and arbitrary PHP file inclusion attempts.

prevent

Requires timely flaw remediation by patching the vulnerable News and Blog Designer Bundle plugin up to version 1.1.

prevent

Enforces file system access controls to restrict reading and execution of unauthorized PHP files via the LFI vulnerability.

Security SummaryAI

CVE-2025-14502 is a Local File Inclusion (LFI) vulnerability, classified under CWE-98, affecting the News and Blog Designer Bundle plugin for WordPress in all versions up to and including 1.1. The flaw occurs via the "template" parameter, which enables the inclusion and execution of arbitrary .php files on the server. Published on 2026-01-14, it carries a critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no privileges or user interaction required. Exploitation allows execution of PHP code from included files, enabling attackers to bypass access controls, obtain sensitive data, or achieve remote code execution in scenarios where .php files can be uploaded and subsequently included.

Advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/e02683dc-0771-4bd5-bba3-2b5423da1c80?source=cve, provide additional details on the issue. The vulnerable code is located at line 31 in the plugin's class-nbdb-ajax.php file, as shown in the WordPress plugin trac repository at https://plugins.trac.wordpress.org/browser/news-and-blog-designer-bundle/trunk/includes/class-nbdb-ajax.php#L31.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

LFI vulnerability in WordPress plugin enables unauthenticated remote attackers to include and execute arbitrary PHP files, granting remote code execution on a public-facing web application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References