Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Feb 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Villatheme
Villatheme lucky Wheel Giveaway Wordpress Wordpress wordpress |
|
| Vendors & Products |
Villatheme
Villatheme lucky Wheel Giveaway Wordpress Wordpress wordpress |
Wed, 11 Feb 2026 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server. | |
| Title | Lucky Wheel Giveaway <= 1.0.22 - Authenticated (Administrator+) Remote Code Execution via 'conditional_tags' Parameter | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:14:46.577Z
Reserved: 2025-12-11T12:57:34.735Z
Link: CVE-2025-14541
Updated: 2026-02-11T15:40:36.145Z
Status : Deferred
Published: 2026-02-11T02:15:57.887
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14541
No data.
OpenCVE Enrichment
Updated: 2026-04-20T21:00:12Z