EUVD-2025-209399

| CVE-2025-14545 MEDIUM
2026-04-10 WPScan
6.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None

Lifecycle Timeline

4
PoC Detected
Apr 10, 2026 - 19:16 vuln.today
Public exploit code
EUVD ID Assigned
Apr 10, 2026 - 06:15 euvd
EUVD-2025-209399
Analysis Generated
Apr 10, 2026 - 06:15 vuln.today
CVE Published
Apr 10, 2026 - 06:00 nvd
MEDIUM 6.5

Description

The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via the feed generation process.

Analysis

Remote code execution in YML for Yandex Market WordPress plugin versions before 5.0.26 allows unauthenticated remote attackers to execute arbitrary code through the feed generation process. The vulnerability has a CVSS score of 6.5 and publicly available exploit code exists. Exploitation requires only network access with no user interaction, making it relatively straightforward to weaponize despite the low EPSS score (0.09%), suggesting limited real-world exploitation activity at the time of analysis.

Technical Context

YML for Yandex Market is a WordPress plugin that generates product feeds in YML (YAML-like) format for integration with the Yandex marketplace platform. The vulnerability resides in the feed generation process, which likely processes user-supplied or configuration data without adequate sanitization before execution. The attack vector is network-based (AV:N) with low complexity (AC:L), indicating the vulnerability does not require privilege escalation, user interaction, or specialized knowledge. The root cause appears to involve improper input validation or unsafe data handling during feed generation, though specific CWE classification was not provided. The plugin is distributed through WordPress.org repositories and affects all versions from 0 through 5.0.25.

Affected Products

YML for Yandex Market WordPress plugin versions 0 through 5.0.25 are affected, as documented by WPScan (vulnerability ID 9bb1a4ca-976c-461d-82de-8a3b04a56fbc). The plugin is identified by CPE cpe:2.3:a:unknown:yml_for_yandex_market:*:*:*:*:*:*:*:* and is distributed via WordPress.org plugin repository. All installations of the plugin below version 5.0.26 require immediate attention.

Remediation

Update YML for Yandex Market WordPress plugin to version 5.0.26 or later immediately through the WordPress plugin dashboard or manual installation from the official plugin repository. No workarounds are documented to mitigate the vulnerability without upgrading. Website administrators should also review feed generation logs for any suspicious activity or anomalies occurring before the update is applied. Full advisory details and vulnerability tracking information are available at https://nvd.nist.gov/vuln/detail/CVE-2025-14545 and the WPScan vulnerability database.

Priority Score

53
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +32
POC: +20

Share

EUVD-2025-209399 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy