CVE-2025-14615
Unknown Unknown - Not Provided
CSRF in Dashboard Builder Plugin Enables SQL Injection

Publication date: 2026-01-14

Last updated on: 2026-01-14

Assigner: Wordfence

Description
The DASHBOARD BUILDER – WordPress plugin for Charts and Graphs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.7. This is due to missing nonce validation on the settings handler in dashboardbuilder-admin.php. This makes it possible for unauthenticated attackers to modify the stored SQL query and database credentials used by the [show-dashboardbuilder] shortcode via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The modified SQL query is subsequently executed on the front-end when the shortcode is rendered, enabling arbitrary SQL injection and data exfiltration through the publicly visible chart output.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-14
Last Modified
2026-01-14
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordfence dashboard_builder to 1.5.7 (inc)
wordfence dashboard_builder 1.5.6
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-14615 is a vulnerability in the WordPress plugin "Dashboard Builder" (up to version 1.5.7) that allows Cross-Site Request Forgery (CSRF) attacks due to missing nonce validation on the settings handler. This flaw lets unauthenticated attackers trick an administrator into submitting a forged request that modifies stored SQL queries and database credentials. These modified SQL queries are then executed on the front-end when rendering charts, enabling arbitrary SQL injection and data exfiltration through publicly visible chart outputs. The plugin accepts and stores raw SQL queries and database credentials without proper validation or sanitization, relying on insufficient filters that do not prevent SQL injection or other attacks. The vulnerability arises because the plugin processes these inputs from users with administrative privileges without adequate security controls, potentially allowing attackers to manipulate database queries and access sensitive data. [1, 5]


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized modification of database queries and credentials, leading to arbitrary SQL injection attacks. Attackers can exfiltrate sensitive data by manipulating the SQL queries executed by the plugin, potentially exposing confidential information through publicly visible charts. If an attacker tricks an administrator into performing a forged request, they can alter the database connection parameters and queries, which may result in unauthorized database access, data leakage, or corruption. Additionally, storing database credentials without encryption increases the risk of credential exposure if the WordPress installation or database is compromised. [1, 5]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

To detect this vulnerability, you can check if the WordPress site is using the Dashboard Builder plugin version 1.5.7 or earlier. Specifically, look for the presence of the dashboardbuilder-admin.php file and verify if it lacks nonce validation on the settings handler. You can also inspect the WordPress options for stored SQL queries or database credentials related to the plugin, such as options named for dashboardbuilder-host, dashboardbuilder-user, dashboardbuilder-password, dashboardbuilder-name, and dashboardbuilder-sql. On the system, you might search for suspicious POST requests to the plugin's admin settings page that modify these options without proper nonce tokens. Example commands to detect the plugin version and presence of vulnerable files include: 1. On the server, check plugin version: `grep -r 'Version: 1.5.7' wp-content/plugins/dashboard-builder/` 2. Search for presence of dashboardbuilder-admin.php: `find wp-content/plugins/dashboard-builder/ -name dashboardbuilder-admin.php` 3. Check WordPress options table for suspicious SQL queries or credentials: `mysql -e "SELECT option_name, option_value FROM wp_options WHERE option_name LIKE 'dashboardbuilder-%';"` 4. Monitor web server logs for POST requests to the plugin admin page without valid nonce tokens or from unusual sources. These steps help identify if the vulnerable plugin is installed and if suspicious modifications to its settings have occurred. [1, 5]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the Dashboard Builder plugin to a version later than 1.5.7 where the vulnerability is fixed, if available. 2. If an update is not available, temporarily disable or uninstall the plugin to prevent exploitation. 3. Restrict access to the WordPress admin area to trusted users only, ensuring only users with the 'manage_options' capability can access the plugin settings. 4. Implement additional security measures such as Web Application Firewalls (WAF) to block forged requests targeting the plugin's settings handler. 5. Review and reset any stored database credentials and SQL queries in the plugin settings to remove potentially malicious modifications. 6. Monitor logs for suspicious activity related to the plugin. 7. Consider adding nonce validation or other CSRF protections in the plugin code if you have development capability. These steps reduce the risk of exploitation by preventing unauthorized changes to the plugin's stored SQL queries and credentials. [1, 5]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to modify stored SQL queries and database credentials, potentially leading to arbitrary SQL injection and data exfiltration through publicly visible chart outputs. The exposure and unauthorized access to sensitive data, including database credentials and user data, could result in violations of data protection regulations such as GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access and breaches. The insecure handling and storage of database credentials without encryption further increase the risk of data compromise, impacting compliance with these standards. [1, 5]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart