VYPR
Medium severity4.3NVD Advisory· Published Oct 31, 2025· Updated Apr 15, 2026

CVE-2025-64356

CVE-2025-64356

Description

Missing Authorization vulnerability in f1logic Insert PHP Code Snippet insert-php-code-snippet allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Insert PHP Code Snippet: from n/a through <= 1.4.3.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in Insert PHP Code Snippet plugin (≤1.4.3) allows unauthenticated or low-privilege users to exploit incorrectly configured access controls.

Vulnerability

Overview The Insert PHP Code Snippet plugin for WordPress, versions 1.4.3 and earlier, contains a missing authorization vulnerability. The plugin fails to properly enforce proper access control checks on certain functions, allowing exploitation of incorrectly configured access control security levels. This is classified as a broken access control issue, where the plugin does not verify that the user has the required privileges before executing sensitive actions [1].

Exploitation

Conditions An attacker can exploit this vulnerability without needing high-level privileges. The missing authorization means that any user who can interact with the plugin's functionality—potentially including unauthenticated visitors—may be able to perform actions that should be restricted to administrators. The attack surface is broad because the plugin is used on many WordPress sites, and the vulnerability can be chained in mass-exploit campaigns targeting thousands of websites regardless of their size or popularity [1].

Impact

Successful exploitation allows an attacker to bypass access controls and execute unauthorized actions, such as inserting or modifying PHP code snippets. This could lead to arbitrary code execution on the server, data theft, or complete site compromise, depending on the specific missing authorization. The CVSS score. The CVSS v3 base score is 4.3 (Medium), indicating a low severity impact, and the vendor notes it is unlikely to be exploited in practice [1].

Mitigation

The vulnerability is patched in version 1.4.4 of the plugin. Users are strongly advised to update immediately. If updating is not possible, users should contact their hosting provider or web developer for assistance. Patchstack users can enable auto-updates for vulnerable plugins to stay protected [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.