CVE-2022-1186: CWE-200 Information Exposure in bepopiacompliant Be POPIA Compliant
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
AI Analysis
Technical Summary
CVE-2022-1186 is a medium-severity information exposure vulnerability affecting the WordPress plugin 'Be POPIA Compliant' up to and including version 1.1.5. The vulnerability arises from an API route within the plugin that improperly exposes sensitive user information—specifically, site visitors' email addresses and usernames—to unauthenticated users. This means that any visitor to a website using the vulnerable plugin version can access this data without needing to log in or authenticate. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) with no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild, and no official patches or updates were linked in the provided information, though it is likely that plugin developers have addressed this issue in later versions. The vulnerability is significant because it compromises user privacy by leaking personally identifiable information (PII), which is particularly sensitive under data protection regulations such as the EU's GDPR. The exposure of emails and usernames can facilitate targeted phishing attacks, spam campaigns, or user enumeration attacks, potentially leading to further exploitation.
Potential Impact
For European organizations, this vulnerability poses a notable risk due to the strict data protection and privacy regulations enforced by the GDPR. Exposure of email addresses and usernames without user consent can lead to regulatory penalties and damage to organizational reputation. Organizations using the 'Be POPIA Compliant' plugin on WordPress sites may inadvertently expose their users' PII, increasing the risk of phishing, social engineering, and spam attacks targeting their user base. This can degrade user trust and potentially lead to account compromise if attackers use the exposed information as a foothold for credential stuffing or brute force attacks. Additionally, organizations may face legal consequences for failing to adequately protect personal data. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the indirect consequences of data leakage can be severe, especially for organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify if their WordPress sites use the 'Be POPIA Compliant' plugin and identify the version in use. If running version 1.1.5 or earlier, they should upgrade to the latest patched version provided by the plugin developer as soon as it becomes available. In the absence of an official patch, organizations should consider disabling or removing the plugin temporarily to prevent data leakage. Additionally, organizations can implement web application firewall (WAF) rules to restrict access to the vulnerable API endpoints, limiting exposure to unauthenticated users. Monitoring web server logs for unusual access patterns to the API route can help detect exploitation attempts. Organizations should also review their privacy policies and notify affected users if data exposure has occurred, in compliance with GDPR breach notification requirements. Regular security audits of WordPress plugins and adherence to the principle of least privilege for API endpoints are recommended to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Ireland
CVE-2022-1186: CWE-200 Information Exposure in bepopiacompliant Be POPIA Compliant
Description
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
AI-Powered Analysis
Technical Analysis
CVE-2022-1186 is a medium-severity information exposure vulnerability affecting the WordPress plugin 'Be POPIA Compliant' up to and including version 1.1.5. The vulnerability arises from an API route within the plugin that improperly exposes sensitive user information—specifically, site visitors' email addresses and usernames—to unauthenticated users. This means that any visitor to a website using the vulnerable plugin version can access this data without needing to log in or authenticate. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) with no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild, and no official patches or updates were linked in the provided information, though it is likely that plugin developers have addressed this issue in later versions. The vulnerability is significant because it compromises user privacy by leaking personally identifiable information (PII), which is particularly sensitive under data protection regulations such as the EU's GDPR. The exposure of emails and usernames can facilitate targeted phishing attacks, spam campaigns, or user enumeration attacks, potentially leading to further exploitation.
Potential Impact
For European organizations, this vulnerability poses a notable risk due to the strict data protection and privacy regulations enforced by the GDPR. Exposure of email addresses and usernames without user consent can lead to regulatory penalties and damage to organizational reputation. Organizations using the 'Be POPIA Compliant' plugin on WordPress sites may inadvertently expose their users' PII, increasing the risk of phishing, social engineering, and spam attacks targeting their user base. This can degrade user trust and potentially lead to account compromise if attackers use the exposed information as a foothold for credential stuffing or brute force attacks. Additionally, organizations may face legal consequences for failing to adequately protect personal data. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the indirect consequences of data leakage can be severe, especially for organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify if their WordPress sites use the 'Be POPIA Compliant' plugin and identify the version in use. If running version 1.1.5 or earlier, they should upgrade to the latest patched version provided by the plugin developer as soon as it becomes available. In the absence of an official patch, organizations should consider disabling or removing the plugin temporarily to prevent data leakage. Additionally, organizations can implement web application firewall (WAF) rules to restrict access to the vulnerable API endpoints, limiting exposure to unauthenticated users. Monitoring web server logs for unusual access patterns to the API route can help detect exploitation attempts. Organizations should also review their privacy policies and notify affected users if data exposure has occurred, in compliance with GDPR breach notification requirements. Regular security audits of WordPress plugins and adherence to the principle of least privilege for API endpoints are recommended to prevent similar issues.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-03-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbc78
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:54:59 PM
Last updated: 2/7/2026, 11:42:35 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.