CVE-2025-10750: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in cyberlord92 PowerBI Embed Reports
The PowerBI Embed Reports plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.2.0. This is due to missing capability checks and authentication verification on the 'testUser' endpoint accessible via the mo_epbr_admin_observer() function hooked on 'init'. This makes it possible for unauthenticated attackers to access sensitive Azure AD user information including personal identifiable information (PII) such as displayName, mail, phones, department, or detailed OAuth error data including Azure AD Application/Client IDs, error codes, trace IDs, and correlation IDs.
AI Analysis
Technical Summary
CVE-2025-10750 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the PowerBI Embed Reports plugin for WordPress, developed by cyberlord92. This plugin enables embedding PowerBI reports within WordPress sites, leveraging Azure Active Directory (Azure AD) for authentication and data access. The vulnerability exists in all versions up to and including 1.2.0 due to the absence of proper capability checks and authentication verification on the 'testUser' endpoint. This endpoint is accessible via the mo_epbr_admin_observer() function, which is hooked into WordPress's 'init' action, making it reachable without any authentication or user interaction. An unauthenticated attacker can invoke this endpoint remotely to retrieve sensitive Azure AD user information, including personally identifiable information (PII) such as displayName, mail, phone numbers, and department. Additionally, detailed OAuth error information is exposed, including Azure AD Application/Client IDs, error codes, trace IDs, and correlation IDs. These details could aid attackers in reconnaissance, social engineering, or further attacks targeting Azure AD or the affected organization's infrastructure. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the vulnerability's ease of exploitation (no authentication required) but limited impact on confidentiality (only information disclosure, no integrity or availability impact). No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a critical security oversight in the plugin's access control mechanisms, emphasizing the need for proper authentication and capability checks on sensitive endpoints.
Potential Impact
For European organizations, this vulnerability poses a significant privacy and security risk, especially for those using WordPress sites integrated with PowerBI and Azure AD. The unauthorized disclosure of PII such as names, emails, phone numbers, and departmental information can lead to privacy violations under GDPR and other data protection regulations, potentially resulting in legal and financial penalties. Exposure of OAuth error data and Azure AD Application/Client IDs can facilitate targeted attacks, including phishing, credential stuffing, or lateral movement within corporate networks. While the vulnerability does not allow direct modification or disruption of services, the information leakage can be leveraged for further exploitation. Organizations in sectors with high regulatory scrutiny or handling sensitive data—such as finance, healthcare, government, and critical infrastructure—are particularly at risk. The ease of exploitation without authentication increases the threat level, as attackers can scan for vulnerable endpoints and harvest data at scale. This could also damage organizational reputation and trust if customer or employee data is exposed. Given the widespread use of WordPress and PowerBI in Europe, the potential attack surface is considerable.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the PowerBI Embed Reports plugin and verify the version in use. Since no official patch is currently available, temporary mitigations include disabling or removing the plugin until a secure update is released. If the plugin is essential, restrict access to the WordPress admin area and the affected endpoints using web application firewalls (WAFs) or IP whitelisting to prevent unauthenticated access. Implement strict network segmentation and monitoring to detect unusual access patterns to the 'testUser' endpoint. Review and harden Azure AD application permissions and logging to detect suspicious activities related to OAuth tokens and client IDs. Engage with the plugin vendor or community to obtain updates or patches and apply them promptly once available. Additionally, conduct regular security assessments and penetration tests focusing on WordPress plugins and integrations. Educate administrators about the risks of exposing sensitive endpoints without authentication and enforce secure coding practices for custom plugins or modifications.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CVE-2025-10750: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in cyberlord92 PowerBI Embed Reports
Description
The PowerBI Embed Reports plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.2.0. This is due to missing capability checks and authentication verification on the 'testUser' endpoint accessible via the mo_epbr_admin_observer() function hooked on 'init'. This makes it possible for unauthenticated attackers to access sensitive Azure AD user information including personal identifiable information (PII) such as displayName, mail, phones, department, or detailed OAuth error data including Azure AD Application/Client IDs, error codes, trace IDs, and correlation IDs.
AI-Powered Analysis
Technical Analysis
CVE-2025-10750 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the PowerBI Embed Reports plugin for WordPress, developed by cyberlord92. This plugin enables embedding PowerBI reports within WordPress sites, leveraging Azure Active Directory (Azure AD) for authentication and data access. The vulnerability exists in all versions up to and including 1.2.0 due to the absence of proper capability checks and authentication verification on the 'testUser' endpoint. This endpoint is accessible via the mo_epbr_admin_observer() function, which is hooked into WordPress's 'init' action, making it reachable without any authentication or user interaction. An unauthenticated attacker can invoke this endpoint remotely to retrieve sensitive Azure AD user information, including personally identifiable information (PII) such as displayName, mail, phone numbers, and department. Additionally, detailed OAuth error information is exposed, including Azure AD Application/Client IDs, error codes, trace IDs, and correlation IDs. These details could aid attackers in reconnaissance, social engineering, or further attacks targeting Azure AD or the affected organization's infrastructure. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the vulnerability's ease of exploitation (no authentication required) but limited impact on confidentiality (only information disclosure, no integrity or availability impact). No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a critical security oversight in the plugin's access control mechanisms, emphasizing the need for proper authentication and capability checks on sensitive endpoints.
Potential Impact
For European organizations, this vulnerability poses a significant privacy and security risk, especially for those using WordPress sites integrated with PowerBI and Azure AD. The unauthorized disclosure of PII such as names, emails, phone numbers, and departmental information can lead to privacy violations under GDPR and other data protection regulations, potentially resulting in legal and financial penalties. Exposure of OAuth error data and Azure AD Application/Client IDs can facilitate targeted attacks, including phishing, credential stuffing, or lateral movement within corporate networks. While the vulnerability does not allow direct modification or disruption of services, the information leakage can be leveraged for further exploitation. Organizations in sectors with high regulatory scrutiny or handling sensitive data—such as finance, healthcare, government, and critical infrastructure—are particularly at risk. The ease of exploitation without authentication increases the threat level, as attackers can scan for vulnerable endpoints and harvest data at scale. This could also damage organizational reputation and trust if customer or employee data is exposed. Given the widespread use of WordPress and PowerBI in Europe, the potential attack surface is considerable.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the PowerBI Embed Reports plugin and verify the version in use. Since no official patch is currently available, temporary mitigations include disabling or removing the plugin until a secure update is released. If the plugin is essential, restrict access to the WordPress admin area and the affected endpoints using web application firewalls (WAFs) or IP whitelisting to prevent unauthenticated access. Implement strict network segmentation and monitoring to detect unusual access patterns to the 'testUser' endpoint. Review and harden Azure AD application permissions and logging to detect suspicious activities related to OAuth tokens and client IDs. Engage with the plugin vendor or community to obtain updates or patches and apply them promptly once available. Additionally, conduct regular security assessments and penetration tests focusing on WordPress plugins and integrations. Educate administrators about the risks of exposing sensitive endpoints without authentication and enforce secure coding practices for custom plugins or modifications.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-19T20:28:14.943Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f3445827133b8ceda05e2d
Added to database: 10/18/2025, 7:40:08 AM
Last enriched: 10/25/2025, 9:57:42 AM
Last updated: 12/4/2025, 11:21:18 AM
Views: 81
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Protecting LLM chats from the eavesdropping Whisper Leak attack | Kaspersky official blog
MediumCVE-2025-14010: Vulnerability in Red Hat Red Hat Ceph Storage 5
MediumRecord 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
MediumCVE-2025-12826: CWE-862 Missing Authorization in webdevstudios Custom Post Type UI
MediumCVE-2025-12782: CWE-862 Missing Authorization in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.