Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0969: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in themefusecom Brizy – Page Builder

0
Medium
VulnerabilityCVE-2025-0969cvecve-2025-0969cwe-359
Published: Sat Dec 13 2025 (12/13/2025, 08:21:13 UTC)
Source: CVE Database V5
Vendor/Project: themefusecom
Product: Brizy – Page Builder

Description

The Brizy – Page Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.16 via the get_users() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including email addresses and hashed passwords of administrators.

AI-Powered Analysis

AILast updated: 12/20/2025, 09:09:22 UTC

Technical Analysis

CVE-2025-0969 identifies a vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) in the Brizy – Page Builder plugin for WordPress, affecting all versions up to and including 2.7.16. The flaw resides in the get_users() function, which improperly exposes sensitive user data to authenticated users with Contributor-level permissions or higher. Specifically, this vulnerability allows such users to retrieve email addresses and hashed passwords of administrators, which are typically protected. The attack vector requires network access and authenticated privileges but no user interaction, making exploitation feasible in environments where Contributor roles are assigned. The vulnerability impacts confidentiality by leaking sensitive information but does not affect data integrity or system availability. The CVSS 3.1 base score is 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, and privileges required. No public exploits have been reported yet, but the risk remains significant due to the nature of the exposed data. The vulnerability is particularly concerning for multi-user WordPress installations where contributors are trusted with content creation but should not access sensitive administrative data. The lack of available patches at the time of publication necessitates interim mitigations. The vulnerability was reserved early in 2025 and published in December 2025, indicating recent discovery and disclosure.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data leakage from WordPress sites using the Brizy – Page Builder plugin. Exposure of administrator email addresses and hashed passwords can facilitate targeted phishing, credential stuffing, or privilege escalation attacks, potentially leading to broader compromise of web infrastructure. Organizations relying on WordPress for corporate websites, intranets, or customer portals may face reputational damage, regulatory scrutiny under GDPR due to personal data exposure, and operational disruptions if attackers leverage leaked credentials. The medium severity indicates that while the vulnerability does not directly enable system takeover, it significantly lowers the barrier for further attacks. Given the widespread use of WordPress in Europe and the popularity of page builder plugins, the threat surface is substantial. Additionally, the requirement for authenticated access means insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Contributor-level and higher user accounts to only trusted personnel, minimizing the number of users with such privileges. 2) Monitor user activity logs for unusual access patterns to user data or attempts to enumerate users via the get_users() function. 3) Apply principle of least privilege by reviewing and tightening WordPress role capabilities, potentially disabling or limiting access to user enumeration functions for non-administrative roles. 4) Temporarily disable or replace the Brizy – Page Builder plugin if feasible until a security patch is released by the vendor. 5) Implement multi-factor authentication (MFA) for all WordPress accounts to reduce risk from compromised credentials. 6) Keep WordPress core and all plugins updated, and subscribe to vendor security advisories for timely patch deployment. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API calls or user enumeration attempts. 8) Educate content contributors about phishing and social engineering risks to prevent account compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive plugin management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-02-02T01:30:03.441Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693d2747f35c2264d84722e4

Added to database: 12/13/2025, 8:43:51 AM

Last enriched: 12/20/2025, 9:09:22 AM

Last updated: 2/6/2026, 5:14:02 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats