Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11196: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in tbenyon External Login

0
Medium
VulnerabilityCVE-2025-11196cvecve-2025-11196cwe-200
Published: Wed Oct 15 2025 (10/15/2025, 08:26:02 UTC)
Source: CVE Database V5
Vendor/Project: tbenyon
Product: External Login

Description

The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.

AI-Powered Analysis

AILast updated: 10/15/2025, 08:52:21 UTC

Technical Analysis

CVE-2025-11196 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the External Login plugin for WordPress, developed by tbenyon. The flaw exists in all versions up to and including 1.11.2 due to the 'exlog_test_connection' AJAX action lacking both capability checks and nonce validation. This means that any authenticated user with subscriber-level privileges or higher can invoke this AJAX endpoint to perform diagnostic tests that query the configured external database. The response includes truncated usernames, email addresses, and password hashes, exposing sensitive user data that should be protected. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L) since no additional conditions are needed beyond subscriber access. The impact is limited to confidentiality (C:L), with no integrity or availability effects. The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, resulting in a medium severity score of 4.3. No patches or mitigations have been officially released at the time of publication, and no known exploits have been observed in the wild. The vulnerability poses a risk primarily to WordPress sites using the External Login plugin that integrate with external databases for authentication, potentially exposing user credentials and personal information to low-privileged insiders or compromised accounts.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of user credentials and personal information stored in external authentication databases. This exposure increases the risk of credential reuse attacks, phishing, and lateral movement within compromised networks. Organizations relying on WordPress sites with the External Login plugin for employee portals, customer-facing applications, or partner integrations may face data privacy violations under GDPR due to unauthorized access to personal data such as email addresses. Although the vulnerability requires authenticated access, subscriber-level accounts are common and often easier to compromise or obtain through social engineering. The exposure of password hashes, even if truncated, can facilitate offline cracking attempts, potentially leading to further account compromises. The absence of patches means organizations must rely on compensating controls until updates are available. The impact on availability and integrity is negligible, but confidentiality breaches can damage reputation and incur regulatory penalties.

Mitigation Recommendations

1. Immediately audit WordPress sites using the External Login plugin to identify affected versions (up to 1.11.2). 2. Restrict subscriber-level user capabilities and review user roles to minimize unnecessary access. 3. Implement strict monitoring and logging of AJAX requests, particularly those invoking 'exlog_test_connection', to detect suspicious activity. 4. Disable or restrict access to the External Login plugin’s diagnostic features if possible, using web application firewalls or custom code to block unauthorized AJAX calls. 5. Enforce strong authentication mechanisms and consider multi-factor authentication to reduce the risk of account compromise. 6. Regularly update WordPress and plugins once patches become available from the vendor. 7. Conduct password resets for users if exposure is suspected, especially if password hashes may have been leaked. 8. Educate users about phishing and social engineering risks to prevent credential theft. 9. Review external database access logs for unusual queries or connections. 10. Consider isolating external authentication databases from the WordPress environment to limit exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-30T17:49:32.203Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef5c7dc4f69c9730e569ef

Added to database: 10/15/2025, 8:34:05 AM

Last enriched: 10/15/2025, 8:52:21 AM

Last updated: 10/16/2025, 3:54:26 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats