Cyber Posture

CVE-2026-25001

HighRCE

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 8.5 CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 18.9th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25001 is a high-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 8.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the code injection vulnerability in Post Snippets plugin versions through 4.0.12 by identifying, reporting, and correcting the flaw.

prevent

Prevents remote code inclusion by validating untrusted inputs to the Post Snippets plugin that could lead to code injection.

detect

Detects the presence of the vulnerable Post Snippets plugin through vulnerability scanning, enabling proactive remediation of this specific CVE.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Code injection vulnerability in public-facing WordPress plugin directly enables T1190 for initial RCE access; arbitrary code execution facilitates T1059.004 Unix Shell on typical Linux hosting.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.

Deeper analysisAI

CVE-2026-25001 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the Post Snippets WordPress plugin developed by Saad Iqbal. The flaw enables Remote Code Inclusion and affects all versions of the plugin from its initial release through 4.0.12. Published on 2026-03-25, it carries a CVSS v3.1 base score of 8.5 (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H), indicating high severity due to network accessibility, changed scope, and substantial impacts on confidentiality, integrity, and availability.

A low-privileged remote attacker (PR:L) can exploit this vulnerability over the network without user interaction. Exploitation requires high attack complexity but allows achievement of remote code execution, granting high-level compromise of the affected system across confidentiality, integrity, and availability metrics within a changed scope.

The Patchstack advisory provides further details on this remote code execution vulnerability in Post Snippets 4.0.12 at https://patchstack.com/database/Wordpress/Plugin/post-snippets/vulnerability/wordpress-post-snippets-plugin-4-0-12-remote-code-execution-rce-vulnerability?_s_id=cve.

Details

CWE(s)

CVEs Like This One

CVE-2024-39148Shared CWE-94
CVE-2026-3120Shared CWE-94
CVE-2025-22905Shared CWE-94
CVE-2026-29955Shared CWE-94
CVE-2024-55964Shared CWE-94
CVE-2025-26003Shared CWE-94
CVE-2024-54803Shared CWE-94
CVE-2025-24677Shared CWE-94
CVE-2024-53944Shared CWE-94
CVE-2024-54804Shared CWE-94

References