CVE-2025-67944
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-04-27

Assigner: Patchstack

Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.1.8.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nelio_software nelio_ab_testing to 8.1.8 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-67944 is a code injection vulnerability in the Nelio AB Testing WordPress plugin (versions up to 8.1.8). It allows a malicious user with Editor or Developer privileges to execute arbitrary code remotely on the affected site. This means an attacker can run unauthorized commands or scripts, potentially taking control of the website. The vulnerability is classified under OWASP Top 10 category A3: Injection and has a high severity score of 9.1. It was fixed in version 8.2.0 of the plugin. [1]


How can this vulnerability impact me? :

This vulnerability can have a significant impact by allowing an attacker with moderate site permissions (Editor or Developer) to execute arbitrary code remotely. This could lead to unauthorized access, data theft, site defacement, or complete site takeover. Because the attacker does not need administrator privileges, the risk of exploitation is higher, potentially compromising the integrity and security of your website. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection can be performed by checking the installed version of the Nelio AB Testing WordPress plugin. If the version is 8.1.8 or earlier, the system is vulnerable. Additionally, Patchstack provides a security rule that can be enabled to block attacks targeting this vulnerability, which can also help in detection. Specific commands are not provided in the resources. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Nelio AB Testing plugin to version 8.2.0 or later, where the vulnerability is fixed. Alternatively, users of Patchstack can enable the provided security rule that blocks attacks targeting this vulnerability and enable auto-updates for vulnerable plugins to ensure rapid protection. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart