Cyber Posture

CVE-2025-69319

HighRCE

Published: 22 January 2026

Published
22 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0007 21.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-69319 is a high-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-94

Makes persistent code injection into loaded programs impossible when the executable image itself resides on hardware-protected read-only media.

addresses: CWE-94

Dynamically generated code can be produced and executed inside the isolated chamber, preventing host compromise from code-injection payloads.

addresses: CWE-94

Validates inputs used in dynamic code generation to block injected directives.

addresses: CWE-94

Directly prevents execution of attacker-supplied code written into data memory regions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1505.003 Web Shell Persistence
Adversaries may backdoor web servers with web shells to establish persistent access to systems.
Why these techniques?

Code injection (CWE-94) in public-facing WordPress plugin directly enables exploitation of the web application for RCE (T1190) and deployment of a web shell (T1505.003).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Beaver Builder Beaver Builder beaver-builder-lite-version allows Code Injection.This issue affects Beaver Builder: from n/a through <= 2.9.4.1.

Deeper analysisAI

CVE-2025-69319 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the Beaver Builder Lite version WordPress plugin. This issue affects Beaver Builder versions from n/a through 2.9.4.1 and carries a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H), rated as High severity.

The vulnerability can be exploited by low-privileged authenticated users (PR:L) over the network (AV:N), though it requires high attack complexity (AC:H) and no user interaction (UI:N). Successful attacks enable arbitrary code execution, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H).

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/beaver-builder-lite-version/vulnerability/wordpress-beaver-builder-plugin-2-9-4-1-arbitrary-code-execution-vulnerability?_s_id=cve details this arbitrary code execution vulnerability in Beaver Builder plugin version 2.9.4.1.

Details

CWE(s)

CVEs Like This One

CVE-2025-66224Shared CWE-94
CVE-2026-26699Shared CWE-94
CVE-2026-2296Shared CWE-94
CVE-2024-50660Shared CWE-94
CVE-2026-1540Shared CWE-94
CVE-2024-13890Shared CWE-94
CVE-2026-3352Shared CWE-94
CVE-2025-70995Shared CWE-94
CVE-2023-53888Shared CWE-94
CVE-2026-27044Shared CWE-94

References