CVE-2025-67944
Published: 22 January 2026
Summary
CVE-2025-67944 is a critical-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Web Shell (T1505.003); ranked at the 20.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the specific code injection flaw in Nelio AB Testing plugin versions through 8.1.8 by identifying, reporting, and applying patches.
Implements input validation and error handling at plugin entry points to block malicious code injection payloads.
Enforces least privilege to minimize the number of high-privilege administrator accounts that could exploit the PR:H requirement.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Code injection (CWE-94) in WordPress plugin directly enables arbitrary PHP/server-side code execution by a privileged admin, mapping to web shell implantation and Unix shell command execution.
NVD Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.1.8.
Deeper analysisAI
CVE-2025-67944 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the Nelio AB Testing WordPress plugin (nelio-ab-testing) developed by Nelio Software. This issue affects all versions of the plugin from n/a through 8.1.8 inclusive. The vulnerability carries a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), marking it as critical due to its potential for severe impact.
The attack scenario requires an authenticated attacker with high privileges, such as an administrator, to exploit the vulnerability remotely with low complexity and no user interaction. Successful exploitation enables arbitrary code injection and execution, granting the attacker high-impact control over confidentiality, integrity, and availability, with a scope change that can affect broader system components.
The primary advisory from Patchstack (https://patchstack.com/database/Wordpress/Plugin/nelio-ab-testing/vulnerability/wordpress-nelio-ab-testing-plugin-8-1-8-arbitrary-code-execution-vulnerability?_s_id=cve) documents this as an arbitrary code execution vulnerability specifically in Nelio AB Testing version 8.1.8. Security practitioners should consult the advisory for detailed mitigation recommendations, including any available patches or workarounds.
Details
- CWE(s)