Lucky Wheel Giveaway Vulnerability (High) – CVE-2025-14541

Lucky Wheel Giveaway Vulnerability (High) – CVE-2025-14541

by | Feb 10, 2026 | Plugins

Attack Vectors

Lucky Wheel Giveaway (slug: wp-lucky-wheel) is affected by a High-severity vulnerability (CVSS 7.2, CVE-2025-14541) that can be exploited over the network in WordPress environments where the plugin is installed.

The attack requires an authenticated user with Administrator-level access (or higher). An attacker in that role can pass a crafted value through the plugin’s conditional_tags parameter to trigger remote code execution on the server.

Security Weakness

The root issue is the plugin’s use of PHP’s eval() on user-controlled input in the conditional_tags parameter, without proper validation or sanitization. In business terms, this creates a direct path from an administrative action in WordPress to arbitrary code running on the underlying web server.

Because the vulnerability is present in Lucky Wheel Giveaway versions up to and including 1.0.22, any site running those versions is exposed until it is updated to a patched release.

Technical or Business Impacts

Remote Code Execution (RCE) is one of the highest-risk outcomes for a WordPress site because it can enable full compromise of the server and application. Even though this issue requires Administrator privileges, it can still be exploited through compromised admin accounts, shared credentials, excessive access, or a malicious insider.

Potential impacts include data theft (customer records, marketing lists, lead data, analytics), site defacement and brand damage, malware distribution to visitors, and operational downtime affecting revenue-generating campaigns and customer trust. For regulated organizations, it may also trigger compliance and notification obligations, plus audit findings tied to access control and patch management.

Remediation: Update Lucky Wheel Giveaway to version 1.0.23 or newer patched versions. Track the official record for reference: CVE-2025-14541. Vulnerability source: Wordfence Threat Intelligence entry.

Similar Attacks

RCE-style issues in popular web platforms are frequently leveraged for rapid, at-scale compromise because they can lead to complete control of a site. While every incident differs, the business risk pattern is consistent: unauthorized code execution often results in data exposure, disruption, and reputational harm.

Examples of widely documented incidents and exploited vulnerabilities include the Apache HTTP Server CVE-2021-41773 exploitation and the Log4j (CVE-2021-44228) RCE guidance from CISA.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers