CVE-2025-14475
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary PHP code on WordPress sites using the Extensive VC Addons plugin. Attackers can include and execute local PHP files via the plugin's AJAX functionality. All WordPress sites with this plugin installed up to version 1.9.1 are affected.
💻 Affected Systems
- Extensive VC Addons for WPBakery page builder plugin for WordPress
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete server compromise leading to data theft, ransomware deployment, or website defacement via arbitrary PHP code execution.
Likely Case
Website takeover, backdoor installation, credential harvesting, or malware distribution.
If Mitigated
Limited impact if proper file permissions, web application firewalls, and intrusion detection systems are in place.
🎯 Exploit Status
The vulnerability is in an AJAX endpoint accessible without authentication, making exploitation straightforward.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.9.2 or later
Vendor Advisory: https://wordpress.org/plugins/extensive-vc-addon/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Extensive VC Addons' and click 'Update Now'. 4. Verify the plugin version is 1.9.2 or higher.
🔧 Temporary Workarounds
Disable the vulnerable plugin
allTemporarily deactivate the Extensive VC Addons plugin until patched.
wp plugin deactivate extensive-vc-addon
Block vulnerable AJAX endpoint
linuxUse web application firewall or .htaccess to block access to the vulnerable AJAX action.
RewriteCond %{QUERY_STRING} action=extensive_vc_init_shortcode_pagination [NC]
RewriteRule ^ - [F]
🧯 If You Can't Patch
- Implement strict file permissions on PHP files and disable PHP execution in upload directories.
- Deploy a web application firewall (WAF) with rules to block local file inclusion attempts.
🔍 How to Verify
Check if Vulnerable:
Check if the Extensive VC Addons plugin is installed and its version is 1.9.1 or lower in WordPress admin panel.
Check Version:
wp plugin get extensive-vc-addon --field=version
Verify Fix Applied:
Verify the plugin version is 1.9.2 or higher after updating.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /wp-admin/admin-ajax.php with action=extensive_vc_init_shortcode_pagination and suspicious shortcode_name parameters
- Unusual file inclusion attempts in web server logs
Network Indicators:
- POST requests to admin-ajax.php with local file paths in parameters
SIEM Query:
source="web_server_logs" AND uri="/wp-admin/admin-ajax.php" AND query="*action=extensive_vc_init_shortcode_pagination*" AND (query="*shortcode_name=*" OR query="*..*" OR query="*php*" OR query="*include*" OR query="*require*")
🔗 References
- https://plugins.trac.wordpress.org/browser/extensive-vc-addon/tags/1.9.1/lib/helpers-functions.php#L78
- https://plugins.trac.wordpress.org/browser/extensive-vc-addon/tags/1.9.1/shortcodes/shortcodes-functions.php#L122
- https://plugins.trac.wordpress.org/browser/extensive-vc-addon/tags/1.9.1/shortcodes/shortcodes-functions.php#L142
- https://plugins.trac.wordpress.org/browser/extensive-vc-addon/trunk/lib/helpers-functions.php#L78
- https://plugins.trac.wordpress.org/browser/extensive-vc-addon/trunk/shortcodes/shortcodes-functions.php#L122
- https://plugins.trac.wordpress.org/browser/extensive-vc-addon/trunk/shortcodes/shortcodes-functions.php#L142
- https://www.wordfence.com/threat-intel/vulnerabilities/id/49711408-5d04-4fdd-a6c4-b224959ba1bc?source=cve