Cyber Posture

CVE-2025-26936

CriticalRCE

Published: 10 March 2025

Published
10 March 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0022 44.5th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26936 is a critical-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 44.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents code injection vulnerabilities like CVE-2025-26936 by validating and sanitizing all information inputs at entry points.

prevent

Ensures timely remediation of known flaws such as the code injection in Fresh Framework versions through 1.70.0 via patching and updates.

preventdetect

Deploys malicious code protection at system entry points to detect and eradicate injected code leading to RCE in the vulnerable WordPress plugin.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

The CVE describes an unauthenticated code injection vulnerability in a public-facing WordPress plugin enabling remote code execution, directly mapping to T1190 for exploitation of public-facing applications and facilitating T1059 for command/script execution via the injected code.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improper Control of Generation of Code ('Code Injection') vulnerability in FRESHFACE Fresh Framework fresh-framework allows Code Injection.This issue affects Fresh Framework: from n/a through <= 1.70.0.

Deeper analysisAI

CVE-2025-26936 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the FRESHFACE Fresh Framework WordPress plugin (fresh-framework). This issue affects all versions from n/a through 1.70.0 inclusive. Published on 2025-03-10, it carries a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), marking it as critically severe due to its potential for widespread remote exploitation.

The vulnerability enables unauthenticated attackers to exploit it remotely over the network with low complexity and no user interaction required. Successful exploitation grants remote code execution (RCE), allowing full compromise of the affected WordPress site with high impacts on confidentiality, integrity, and availability, alongside a scope change that could extend control beyond the vulnerable component.

Patchstack's advisory at https://patchstack.com/database/Wordpress/Plugin/fresh-framework/vulnerability/wordpress-fresh-framework-plugin-1-70-0-unauthenticated-remote-code-execution-rce-vulnerability?_s_id=cve documents the unauthenticated RCE vulnerability in Fresh Framework plugin version 1.70.0.

Details

CWE(s)

CVEs Like This One

CVE-2025-22906Shared CWE-94
CVE-2025-71281Shared CWE-94
CVE-2024-9132Shared CWE-94
CVE-2024-50658Shared CWE-94
CVE-2026-32525Shared CWE-94
CVE-2024-21760Shared CWE-94
CVE-2025-70830Shared CWE-94
CVE-2024-55028Shared CWE-94
CVE-2026-6543Shared CWE-94
CVE-2024-54756Shared CWE-94

References