CVE-2025-14541 PUBLISHED

Lucky Wheel Giveaway <= 1.0.22 - Authenticated (Administrator+) Remote Code Execution via 'conditional_tags' Parameter

Assigner: Wordfence
Reserved: 11.12.2025 Published: 11.02.2026 Updated: 11.02.2026

The Lucky Wheel Giveaway plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0.22 via the conditional_tags parameter. This is due to the plugin using PHP's eval() function on user-controlled input without proper validation or sanitization. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor villatheme
Product Lucky Wheel Giveaway
Versions Default: unaffected
  • affected from * to 1.0.22 (incl.)

Credits

  • Nguyen Truong finder

References

Problem Types

  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE