Cyber Posture

CVE-2025-22630

CriticalRCE

Published: 14 February 2025

Published
14 February 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0060 69.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-22630 is a critical-severity Command Injection (CWE-77) vulnerability. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely remediation of the known command injection flaw in the Widget Options WordPress plugin through patching, directly eliminating the vulnerability.

prevent

Mandates validation and sanitization of all inputs to prevent improper neutralization of special elements leading to OS command injection.

prevent

Enforces least privilege for low-privilege WordPress users and web server processes, limiting the impact of successful command injection exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

OS command injection in public-facing WordPress plugin enables exploitation of public-facing applications (T1190) for arbitrary code execution and use of command/scripting interpreters (T1059) on the server.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in Marketing Fire Widget Options widget-options allows OS Command Injection.This issue affects Widget Options: from n/a through <= 4.1.0.

Deeper analysisAI

CVE-2025-22630 is an Improper Neutralization of Special Elements used in a Command vulnerability, classified under CWE-77, that enables OS Command Injection in the Marketing Fire Widget Options (widget-options) WordPress plugin. This flaw affects all versions of the plugin from unknown initial release through 4.1.0 inclusive. Published on 2025-02-14, it carries a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its network accessibility, low complexity, and potential for scope expansion.

A remote attacker with low privileges, such as a WordPress user with contributor-level access or similar, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows full control over the underlying operating system, achieving high-impact violations of confidentiality, integrity, and availability, including arbitrary code execution on the server hosting the vulnerable WordPress site.

The Patchstack advisory provides detailed analysis of the vulnerability, describing it as an arbitrary code execution issue in Widget Options plugin version 4.1.0; security practitioners should consult https://patchstack.com/database/Wordpress/Plugin/widget-options/vulnerability/wordpress-widget-options-plugin-4-1-0-arbitrary-code-execution-vulnerability?_s_id=cve for patch information, workaround guidance, and affected configurations.

Details

CWE(s)

CVEs Like This One

CVE-2026-2333Shared CWE-77
CVE-2024-55030Shared CWE-77
CVE-2025-60801Shared CWE-77
CVE-2025-24818Shared CWE-77
CVE-2025-52688Shared CWE-77
CVE-2025-60021Shared CWE-77
CVE-2025-59252Shared CWE-77
CVE-2025-59272Shared CWE-77
CVE-2025-70093Shared CWE-77
CVE-2026-20163Shared CWE-77

References