Doubly <= 1.0.46 - Authenticated (Subscriber+) PHP Object Injection via ZIP File Import
Summary
| CVE | CVE-2025-14476 |
|---|---|
| State | PUBLISHED |
| Assigner | Wordfence |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-12-13 16:16:50 UTC |
| Updated | 2026-04-08 18:24:13 UTC |
| Description | The Doubly – Cross Domain Copy Paste for WordPress plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.0.46 via deserialization of untrusted input from the content.txt file within uploaded ZIP archives. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. The additional presence of a POP chain allows attackers to execute arbitrary code, delete files, retrieve sensitive data, or perform other actions depending on the available gadgets. This is only exploitable by subscribers, when administrators have explicitly enabled that access. |
Risk And Classification
Primary CVSS: v3.1 8.8 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.001120000 probability, percentile 0.297780000 (date 2026-04-08)
Problem Types: CWE-502 | CWE-502 CWE-502 Deserialization of Untrusted Data
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | DECLARED | 8.8 | HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
LowUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Unitecms | Doubly Cross Domain Copy Paste For WordPress | affected 1.0.46 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| plugins.trac.wordpress.org/browser/doubly/trunk/inc_php/importer.class.php | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/doubly/tags/1.0.46/inc_php/importer.class.php | [email protected] | plugins.trac.wordpress.org | |
| www.wordfence.com/threat-intel/vulnerabilities/id/4b2c3987-fe7e-426d-8398-acdd6... | [email protected] | www.wordfence.com | |
| plugins.trac.wordpress.org/browser/doubly/tags/1.0.46/inc_php/functions.class.php | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/browser/doubly/trunk/inc_php/functions.class.php | [email protected] | plugins.trac.wordpress.org | |
| plugins.trac.wordpress.org/changeset/3426214 | [email protected] | plugins.trac.wordpress.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Bartłomiej Bergier (en)
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2025-12-12T16:08:49.000Z | Disclosed |
There are currently no legacy QID mappings associated with this CVE.