CVE-2025-14502
Published: 14 January 2026
Description
The News and Blog Designer Bundle plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1 via the template parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary .php…
more
files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included.
Mitigating Controls (NIST 800-53 r5)AI
Implements input validation on the 'template' parameter to block path traversal and arbitrary PHP file inclusion attempts.
Requires timely flaw remediation by patching the vulnerable News and Blog Designer Bundle plugin up to version 1.1.
Enforces file system access controls to restrict reading and execution of unauthorized PHP files via the LFI vulnerability.
Security SummaryAI
CVE-2025-14502 is a Local File Inclusion (LFI) vulnerability, classified under CWE-98, affecting the News and Blog Designer Bundle plugin for WordPress in all versions up to and including 1.1. The flaw occurs via the "template" parameter, which enables the inclusion and execution of arbitrary .php files on the server. Published on 2026-01-14, it carries a critical CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity and no privileges or user interaction required. Exploitation allows execution of PHP code from included files, enabling attackers to bypass access controls, obtain sensitive data, or achieve remote code execution in scenarios where .php files can be uploaded and subsequently included.
Advisories, including the Wordfence threat intelligence report at https://www.wordfence.com/threat-intel/vulnerabilities/id/e02683dc-0771-4bd5-bba3-2b5423da1c80?source=cve, provide additional details on the issue. The vulnerable code is located at line 31 in the plugin's class-nbdb-ajax.php file, as shown in the WordPress plugin trac repository at https://plugins.trac.wordpress.org/browser/news-and-blog-designer-bundle/trunk/includes/class-nbdb-ajax.php#L31.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
LFI vulnerability in WordPress plugin enables unauthenticated remote attackers to include and execute arbitrary PHP files, granting remote code execution on a public-facing web application.