Description
The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Published: 2025-09-04
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The atec Debug WordPress plugin contains a remote code execution flaw triggered by the custom_log parameter. When an attacker with Administrator or higher privileges supplies a malicious value for this parameter, the plugin's inadequate sanitization allows the data to be executed on the server. This flaw gives the attacker full control over the host, potentially leading to data theft, defacement, or further compromise of connected systems.

Affected Systems

The vulnerability applies to the atec Debug plugin for WordPress, version 1.2.22 and all earlier releases. The affected product is maintained by the vendor docjojo and is designed to assist developers with debugging WordPress sites.

Risk and Exploitability

The CVSS score of 7.2 indicates moderate to high severity, while the EPSS score of less than 1% suggests a very low probability of exploitation at this time. The exploit requires authenticated access with Administrator rights, and because the flaw is within a plugin the vulnerability is confined to sites that have the atec Debug plugin installed and are running an unpatched version. The vulnerability is not listed in CISA’s KEV catalog, indicating no known widespread exploitation yet.

Generated by OpenCVE AI on April 21, 2026 at 03:17 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the atec Debug plugin to a version newer than 1.2.22.
  • If an upgrade is not immediately possible, disable or uninstall the atec Debug plugin until a fix can be applied.
  • Restrict access to Administrator accounts and ensure that any custom log paths are properly sanitized or blocked from user input.

Generated by OpenCVE AI on April 21, 2026 at 03:17 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26728 The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
History

Thu, 04 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 04 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 04 Sep 2025 04:30:00 +0000

Type Values Removed Values Added
Description The atec Debug plugin for WordPress is vulnerable to remote code execution in all versions up to, and including, 1.2.22 via the 'custom_log' parameter. This is due to insufficient sanitization when saving the custom log path. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Title atec Debug <= 1.2.22 - Authenticated (Administrator+) Remote Code Execution
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:59.857Z

Reserved: 2025-08-26T23:12:09.112Z

Link: CVE-2025-9517

cve-icon Vulnrichment

Updated: 2025-09-04T17:00:18.240Z

cve-icon NVD

Status : Deferred

Published: 2025-09-04T10:42:35.217

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9517

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:30:26Z

Weaknesses