CVE-2025-14615
CSRF in Dashboard Builder Plugin Enables SQL Injection
Publication date: 2026-01-14
Last updated on: 2026-01-14
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | dashboard_builder | to 1.5.7 (inc) |
| wordfence | dashboard_builder | 1.5.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-14615 is a vulnerability in the WordPress plugin "Dashboard Builder" (up to version 1.5.7) that allows Cross-Site Request Forgery (CSRF) attacks due to missing nonce validation on the settings handler. This flaw lets unauthenticated attackers trick an administrator into submitting a forged request that modifies stored SQL queries and database credentials. These modified SQL queries are then executed on the front-end when rendering charts, enabling arbitrary SQL injection and data exfiltration through publicly visible chart outputs. The plugin accepts and stores raw SQL queries and database credentials without proper validation or sanitization, relying on insufficient filters that do not prevent SQL injection or other attacks. The vulnerability arises because the plugin processes these inputs from users with administrative privileges without adequate security controls, potentially allowing attackers to manipulate database queries and access sensitive data. [1, 5]
How can this vulnerability impact me? :
This vulnerability can have serious impacts including unauthorized modification of database queries and credentials, leading to arbitrary SQL injection attacks. Attackers can exfiltrate sensitive data by manipulating the SQL queries executed by the plugin, potentially exposing confidential information through publicly visible charts. If an attacker tricks an administrator into performing a forged request, they can alter the database connection parameters and queries, which may result in unauthorized database access, data leakage, or corruption. Additionally, storing database credentials without encryption increases the risk of credential exposure if the WordPress installation or database is compromised. [1, 5]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
To detect this vulnerability, you can check if the WordPress site is using the Dashboard Builder plugin version 1.5.7 or earlier. Specifically, look for the presence of the dashboardbuilder-admin.php file and verify if it lacks nonce validation on the settings handler. You can also inspect the WordPress options for stored SQL queries or database credentials related to the plugin, such as options named for dashboardbuilder-host, dashboardbuilder-user, dashboardbuilder-password, dashboardbuilder-name, and dashboardbuilder-sql. On the system, you might search for suspicious POST requests to the plugin's admin settings page that modify these options without proper nonce tokens. Example commands to detect the plugin version and presence of vulnerable files include: 1. On the server, check plugin version: `grep -r 'Version: 1.5.7' wp-content/plugins/dashboard-builder/` 2. Search for presence of dashboardbuilder-admin.php: `find wp-content/plugins/dashboard-builder/ -name dashboardbuilder-admin.php` 3. Check WordPress options table for suspicious SQL queries or credentials: `mysql -e "SELECT option_name, option_value FROM wp_options WHERE option_name LIKE 'dashboardbuilder-%';"` 4. Monitor web server logs for POST requests to the plugin admin page without valid nonce tokens or from unusual sources. These steps help identify if the vulnerable plugin is installed and if suspicious modifications to its settings have occurred. [1, 5]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include: 1. Update the Dashboard Builder plugin to a version later than 1.5.7 where the vulnerability is fixed, if available. 2. If an update is not available, temporarily disable or uninstall the plugin to prevent exploitation. 3. Restrict access to the WordPress admin area to trusted users only, ensuring only users with the 'manage_options' capability can access the plugin settings. 4. Implement additional security measures such as Web Application Firewalls (WAF) to block forged requests targeting the plugin's settings handler. 5. Review and reset any stored database credentials and SQL queries in the plugin settings to remove potentially malicious modifications. 6. Monitor logs for suspicious activity related to the plugin. 7. Consider adding nonce validation or other CSRF protections in the plugin code if you have development capability. These steps reduce the risk of exploitation by preventing unauthorized changes to the plugin's stored SQL queries and credentials. [1, 5]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated attackers to modify stored SQL queries and database credentials, potentially leading to arbitrary SQL injection and data exfiltration through publicly visible chart outputs. The exposure and unauthorized access to sensitive data, including database credentials and user data, could result in violations of data protection regulations such as GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and breaches. The insecure handling and storage of database credentials without encryption further increase the risk of data compromise, impacting compliance with these standards. [1, 5]