CVE-2022-1186: CWE-200 Information Exposure in bepopiacompliant Be POPIA Compliant
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
AI Analysis
Technical Summary
CVE-2022-1186 is a medium-severity information exposure vulnerability affecting the WordPress plugin 'Be POPIA Compliant' up to and including version 1.1.5. The vulnerability arises from an API route within the plugin that improperly exposes sensitive user information—specifically, site visitors' email addresses and usernames—to unauthenticated users. This means that any visitor to a website using the vulnerable plugin version can access this data without needing to log in or authenticate. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) with no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild, and no official patches or updates were linked in the provided information, though it is likely that plugin developers have addressed this issue in later versions. The vulnerability is significant because it compromises user privacy by leaking personally identifiable information (PII), which is particularly sensitive under data protection regulations such as the EU's GDPR. The exposure of emails and usernames can facilitate targeted phishing attacks, spam campaigns, or user enumeration attacks, potentially leading to further exploitation.
Potential Impact
For European organizations, this vulnerability poses a notable risk due to the strict data protection and privacy regulations enforced by the GDPR. Exposure of email addresses and usernames without user consent can lead to regulatory penalties and damage to organizational reputation. Organizations using the 'Be POPIA Compliant' plugin on WordPress sites may inadvertently expose their users' PII, increasing the risk of phishing, social engineering, and spam attacks targeting their user base. This can degrade user trust and potentially lead to account compromise if attackers use the exposed information as a foothold for credential stuffing or brute force attacks. Additionally, organizations may face legal consequences for failing to adequately protect personal data. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the indirect consequences of data leakage can be severe, especially for organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify if their WordPress sites use the 'Be POPIA Compliant' plugin and identify the version in use. If running version 1.1.5 or earlier, they should upgrade to the latest patched version provided by the plugin developer as soon as it becomes available. In the absence of an official patch, organizations should consider disabling or removing the plugin temporarily to prevent data leakage. Additionally, organizations can implement web application firewall (WAF) rules to restrict access to the vulnerable API endpoints, limiting exposure to unauthenticated users. Monitoring web server logs for unusual access patterns to the API route can help detect exploitation attempts. Organizations should also review their privacy policies and notify affected users if data exposure has occurred, in compliance with GDPR breach notification requirements. Regular security audits of WordPress plugins and adherence to the principle of least privilege for API endpoints are recommended to prevent similar issues.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Ireland
CVE-2022-1186: CWE-200 Information Exposure in bepopiacompliant Be POPIA Compliant
Description
The WordPress plugin Be POPIA Compliant exposed sensitive information to unauthenticated users consisting of site visitors emails and usernames via an API route, in versions up to an including 1.1.5.
AI-Powered Analysis
Technical Analysis
CVE-2022-1186 is a medium-severity information exposure vulnerability affecting the WordPress plugin 'Be POPIA Compliant' up to and including version 1.1.5. The vulnerability arises from an API route within the plugin that improperly exposes sensitive user information—specifically, site visitors' email addresses and usernames—to unauthenticated users. This means that any visitor to a website using the vulnerable plugin version can access this data without needing to log in or authenticate. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The CVSS v3.1 base score is 5.3, reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality impact (C:L) with no impact on integrity or availability (I:N/A:N). There are no known exploits in the wild, and no official patches or updates were linked in the provided information, though it is likely that plugin developers have addressed this issue in later versions. The vulnerability is significant because it compromises user privacy by leaking personally identifiable information (PII), which is particularly sensitive under data protection regulations such as the EU's GDPR. The exposure of emails and usernames can facilitate targeted phishing attacks, spam campaigns, or user enumeration attacks, potentially leading to further exploitation.
Potential Impact
For European organizations, this vulnerability poses a notable risk due to the strict data protection and privacy regulations enforced by the GDPR. Exposure of email addresses and usernames without user consent can lead to regulatory penalties and damage to organizational reputation. Organizations using the 'Be POPIA Compliant' plugin on WordPress sites may inadvertently expose their users' PII, increasing the risk of phishing, social engineering, and spam attacks targeting their user base. This can degrade user trust and potentially lead to account compromise if attackers use the exposed information as a foothold for credential stuffing or brute force attacks. Additionally, organizations may face legal consequences for failing to adequately protect personal data. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the indirect consequences of data leakage can be severe, especially for organizations handling sensitive or regulated data.
Mitigation Recommendations
European organizations should immediately verify if their WordPress sites use the 'Be POPIA Compliant' plugin and identify the version in use. If running version 1.1.5 or earlier, they should upgrade to the latest patched version provided by the plugin developer as soon as it becomes available. In the absence of an official patch, organizations should consider disabling or removing the plugin temporarily to prevent data leakage. Additionally, organizations can implement web application firewall (WAF) rules to restrict access to the vulnerable API endpoints, limiting exposure to unauthenticated users. Monitoring web server logs for unusual access patterns to the API route can help detect exploitation attempts. Organizations should also review their privacy policies and notify affected users if data exposure has occurred, in compliance with GDPR breach notification requirements. Regular security audits of WordPress plugins and adherence to the principle of least privilege for API endpoints are recommended to prevent similar issues.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2022-03-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbc78
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 10:54:59 PM
Last updated: 7/29/2025, 4:11:35 AM
Views: 10
Related Threats
CVE-2025-36613: CWE-266: Incorrect Privilege Assignment in Dell SupportAssist for Home PCs
LowCVE-2025-27845: n/a
UnknownCVE-2025-7972: CWE-286: Incorrect User Management in Rockwell Automation FactoryTalk® Linx
HighCVE-2025-8876: CWE-20 Improper Input Validation in N-able N-central
CriticalCVE-2025-8875: CWE-502 Deserialization of Untrusted Data in N-able N-central
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.