CVE-2025-0969: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in themefusecom Brizy – Page Builder
The Brizy – Page Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.16 via the get_users() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including email addresses and hashed passwords of administrators.
AI Analysis
Technical Summary
CVE-2025-0969 identifies a vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) in the Brizy – Page Builder plugin for WordPress, affecting all versions up to and including 2.7.16. The flaw resides in the get_users() function, which improperly exposes sensitive user data to authenticated users with Contributor-level permissions or higher. Specifically, this vulnerability allows such users to retrieve email addresses and hashed passwords of administrators, which are typically protected. The attack vector requires network access and authenticated privileges but no user interaction, making exploitation feasible in environments where Contributor roles are assigned. The vulnerability impacts confidentiality by leaking sensitive information but does not affect data integrity or system availability. The CVSS 3.1 base score is 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, and privileges required. No public exploits have been reported yet, but the risk remains significant due to the nature of the exposed data. The vulnerability is particularly concerning for multi-user WordPress installations where contributors are trusted with content creation but should not access sensitive administrative data. The lack of available patches at the time of publication necessitates interim mitigations. The vulnerability was reserved early in 2025 and published in December 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive data leakage from WordPress sites using the Brizy – Page Builder plugin. Exposure of administrator email addresses and hashed passwords can facilitate targeted phishing, credential stuffing, or privilege escalation attacks, potentially leading to broader compromise of web infrastructure. Organizations relying on WordPress for corporate websites, intranets, or customer portals may face reputational damage, regulatory scrutiny under GDPR due to personal data exposure, and operational disruptions if attackers leverage leaked credentials. The medium severity indicates that while the vulnerability does not directly enable system takeover, it significantly lowers the barrier for further attacks. Given the widespread use of WordPress in Europe and the popularity of page builder plugins, the threat surface is substantial. Additionally, the requirement for authenticated access means insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Contributor-level and higher user accounts to only trusted personnel, minimizing the number of users with such privileges. 2) Monitor user activity logs for unusual access patterns to user data or attempts to enumerate users via the get_users() function. 3) Apply principle of least privilege by reviewing and tightening WordPress role capabilities, potentially disabling or limiting access to user enumeration functions for non-administrative roles. 4) Temporarily disable or replace the Brizy – Page Builder plugin if feasible until a security patch is released by the vendor. 5) Implement multi-factor authentication (MFA) for all WordPress accounts to reduce risk from compromised credentials. 6) Keep WordPress core and all plugins updated, and subscribe to vendor security advisories for timely patch deployment. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API calls or user enumeration attempts. 8) Educate content contributors about phishing and social engineering risks to prevent account compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive plugin management.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-0969: CWE-359 Exposure of Private Personal Information to an Unauthorized Actor in themefusecom Brizy – Page Builder
Description
The Brizy – Page Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.16 via the get_users() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including email addresses and hashed passwords of administrators.
AI-Powered Analysis
Technical Analysis
CVE-2025-0969 identifies a vulnerability classified under CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor) in the Brizy – Page Builder plugin for WordPress, affecting all versions up to and including 2.7.16. The flaw resides in the get_users() function, which improperly exposes sensitive user data to authenticated users with Contributor-level permissions or higher. Specifically, this vulnerability allows such users to retrieve email addresses and hashed passwords of administrators, which are typically protected. The attack vector requires network access and authenticated privileges but no user interaction, making exploitation feasible in environments where Contributor roles are assigned. The vulnerability impacts confidentiality by leaking sensitive information but does not affect data integrity or system availability. The CVSS 3.1 base score is 6.5, reflecting medium severity, with an attack vector of network, low attack complexity, and privileges required. No public exploits have been reported yet, but the risk remains significant due to the nature of the exposed data. The vulnerability is particularly concerning for multi-user WordPress installations where contributors are trusted with content creation but should not access sensitive administrative data. The lack of available patches at the time of publication necessitates interim mitigations. The vulnerability was reserved early in 2025 and published in December 2025, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a risk of sensitive data leakage from WordPress sites using the Brizy – Page Builder plugin. Exposure of administrator email addresses and hashed passwords can facilitate targeted phishing, credential stuffing, or privilege escalation attacks, potentially leading to broader compromise of web infrastructure. Organizations relying on WordPress for corporate websites, intranets, or customer portals may face reputational damage, regulatory scrutiny under GDPR due to personal data exposure, and operational disruptions if attackers leverage leaked credentials. The medium severity indicates that while the vulnerability does not directly enable system takeover, it significantly lowers the barrier for further attacks. Given the widespread use of WordPress in Europe and the popularity of page builder plugins, the threat surface is substantial. Additionally, the requirement for authenticated access means insider threats or compromised contributor accounts can be leveraged to exploit this vulnerability. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Contributor-level and higher user accounts to only trusted personnel, minimizing the number of users with such privileges. 2) Monitor user activity logs for unusual access patterns to user data or attempts to enumerate users via the get_users() function. 3) Apply principle of least privilege by reviewing and tightening WordPress role capabilities, potentially disabling or limiting access to user enumeration functions for non-administrative roles. 4) Temporarily disable or replace the Brizy – Page Builder plugin if feasible until a security patch is released by the vendor. 5) Implement multi-factor authentication (MFA) for all WordPress accounts to reduce risk from compromised credentials. 6) Keep WordPress core and all plugins updated, and subscribe to vendor security advisories for timely patch deployment. 7) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API calls or user enumeration attempts. 8) Educate content contributors about phishing and social engineering risks to prevent account compromise. These targeted actions go beyond generic advice by focusing on access control, monitoring, and proactive plugin management.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-02T01:30:03.441Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693d2747f35c2264d84722e4
Added to database: 12/13/2025, 8:43:51 AM
Last enriched: 12/20/2025, 9:09:22 AM
Last updated: 2/6/2026, 5:14:02 PM
Views: 47
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumCVE-2026-2057: SQL Injection in SourceCodester Medical Center Portal Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.