CVE-2025-14071

7.5 HIGH

📋 TL;DR

The Live Composer WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input in the dslc_module_posts_output shortcode. This allows authenticated attackers with Contributor-level access or higher to inject PHP objects, but exploitation requires a separate plugin or theme containing a POP chain. Without a POP chain, the vulnerability has no direct impact.

💻 Affected Systems

Products:
  • Live Composer – Free WordPress Website Builder
Versions: All versions up to and including 2.0.2
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Contributor-level authentication is required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

If combined with a POP chain from another plugin/theme, attackers could execute arbitrary code, delete files, or steal sensitive data leading to complete site compromise.

🟠

Likely Case

Limited impact since no POP chain exists in the vulnerable plugin itself; exploitation requires specific additional vulnerable components.

🟢

If Mitigated

With proper access controls and no vulnerable POP chains present, the vulnerability has minimal to no impact.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access (Contributor role or higher) and a separate POP chain from another plugin or theme.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.0.2

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3419715/live-composer-page-builder/trunk/modules/posts/module.php

Restart Required: No

Instructions:

1. Update the Live Composer plugin to the latest version via WordPress admin panel. 2. Verify the update to version after 2.0.2. 3. No server restart required.

🔧 Temporary Workarounds

Remove vulnerable shortcode

all

Disable or remove the dslc_module_posts_output shortcode functionality

Edit WordPress theme/plugin files to remove or disable calls to dslc_module_posts_output

Restrict user roles

all

Limit Contributor-level access to trusted users only

Use WordPress role management plugins to restrict Contributor role assignments

🧯 If You Can't Patch

  • Disable the Live Composer plugin entirely until patched
  • Implement strict access controls and monitor for suspicious Contributor-level activity

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for Live Composer plugin version. If version is 2.0.2 or lower, the system is vulnerable.

Check Version:

wp plugin list --name='Live Composer' --field=version (if WP-CLI installed) or check WordPress admin panel

Verify Fix Applied:

Verify the plugin version is higher than 2.0.2 after updating.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress containing serialized data
  • Suspicious activity from Contributor-level accounts

Network Indicators:

  • HTTP requests with serialized PHP objects in parameters

SIEM Query:

source="wordpress" AND (uri_path="*dslc_module_posts_output*" OR post_data="*O:*")

🔗 References

📤 Share & Export