Home

Description

The Lucky Wheel for WooCommerce – Spin a Sale plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.1.13. This is due to the plugin using eval() to execute user-supplied input from the 'Conditional Tags' setting without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary PHP code on the server. In WordPress multisite installations, this allows Site Administrators to execute arbitrary code, a capability they should not have since plugin/theme file editing is disabled for non-Super Admins in multisite environments.

PUBLISHED Reserved 2025-12-11 | Published 2025-12-30 | Updated 2025-12-30 | Assigner Wordfence




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-11:Vendor Notified
2025-12-29:Disclosed

Credits

Nguyen Truong finder

References

www.wordfence.com/...-0ab9-4cee-b3ca-d730c828782c?source=cve

plugins.trac.wordpress.org/...el/trunk/frontend/frontend.php

plugins.trac.wordpress.org/...s/1.1.13/frontend/frontend.php

plugins.trac.wordpress.org/changeset/3428063/

cve.org (CVE-2025-14509)

nvd.nist.gov (CVE-2025-14509)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.