Description
The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via the feed generation process.
Published: 2026-04-10
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Update Plugin
AI Analysis

Impact

The YML for Yandex Market WordPress plugin versions earlier than 5.0.26 contains a flaw that allows attackers to execute arbitrary code during the feed generation process. This vulnerability can compromise the confidentiality, integrity, and availability of the affected WordPress site by enabling full control over the server. It is a classic remote code execution weakness that can be leveraged by an attacker with sufficient access to invoke the feed creation function.

Affected Systems

Any WordPress installation running the YML for Yandex Market plugin prior to version 5.0.26 is potentially affected. The plugin is developed by Unknown:YML for Yandex Market and is used for managing market feeds for Yandex Market sellers.

Risk and Exploitability

The CVSS score is not provided, but the nature of the vulnerability suggests a high or critical severity. EPSS information is unavailable, and the vulnerability is not listed in the CISA KEV catalog, indicating no confirmed widespread exploitation yet. The likely attack vector is via the WordPress admin interface that triggers feed generation, and an attacker may need to be authenticated as an administrator or have sufficient privileges to access that functionality. Even in more restricted environments, the flaw remains exploitable if the feed generation API can be called by untrusted input.

Generated by OpenCVE AI on April 10, 2026 at 07:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the YML for Yandex Market plugin to version 5.0.26 or newer
  • Disable or restrict access to the feed generation feature until a patch is applied
  • Verify that no untrusted data is passed to the feed generation process
  • Review server logs for suspicious activity related to feed generation
  • Consider applying a temporary firewall rule to block the feed generation endpoint if immediate patching is not possible

Generated by OpenCVE AI on April 10, 2026 at 07:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 10:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-94

Fri, 10 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Icopydoc
Icopydoc yml For Yandex Market
Wordpress
Wordpress wordpress
Vendors & Products Icopydoc
Icopydoc yml For Yandex Market
Wordpress
Wordpress wordpress

Fri, 10 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description The YML for Yandex Market WordPress plugin before 5.0.26 is vulnerable to Remote Code Execution via the feed generation process.
Title YML for Yandex Market < 5.0.26 - Shop Manager+ RCE via Feed Generation
References

Subscriptions

Icopydoc Yml For Yandex Market
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-10T18:37:24.983Z

Reserved: 2025-12-11T15:36:38.497Z

Link: CVE-2025-14545

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-10T07:16:19.607

Modified: 2026-04-10T07:16:19.607

Link: CVE-2025-14545

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-10T09:26:37Z

Weaknesses