Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11377: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in fernandobt List category posts

0
Medium
VulnerabilityCVE-2025-11377cvecve-2025-11377cwe-200
Published: Sat Nov 01 2025 (11/01/2025, 04:27:40 UTC)
Source: CVE Database V5
Vendor/Project: fernandobt
Product: List category posts

Description

The List category posts plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.92.0 via the 'catlist' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.

AI-Powered Analysis

AILast updated: 11/01/2025, 04:50:28 UTC

Technical Analysis

CVE-2025-11377 is an information exposure vulnerability classified under CWE-200 affecting the 'List category posts' WordPress plugin developed by fernandobt. The flaw exists in all versions up to and including 0.92.0 and arises from insufficient access control on the 'catlist' shortcode functionality. This shortcode is intended to list posts from specified categories but fails to properly restrict access to posts that are password protected, private, or in draft status. As a result, authenticated users with contributor-level permissions or higher can exploit this vulnerability to retrieve content from posts they should not be authorized to view. The vulnerability is remotely exploitable over the network without requiring user interaction. The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the limited impact on confidentiality and the requirement for authenticated access. There is no impact on integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability highlights a common issue in WordPress plugins where access control checks are insufficiently enforced on content retrieval mechanisms, potentially leading to unauthorized data disclosure within multi-user environments.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality of sensitive or unpublished content managed within WordPress sites using the affected plugin. Organizations that rely on WordPress for content management and have multiple contributors or editors are particularly vulnerable, as these roles have sufficient privileges to exploit the flaw. Exposure of private or draft content could lead to premature disclosure of strategic information, intellectual property, or personal data, potentially violating GDPR requirements and damaging organizational reputation. While the vulnerability does not affect system integrity or availability, unauthorized data exposure can have legal and compliance ramifications under European data protection laws. The risk is heightened in sectors such as media, government, education, and enterprises with collaborative content workflows. Since exploitation requires authenticated access, insider threats or compromised contributor accounts represent the primary attack vectors.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict contributor and editor privileges to the minimum necessary, ensuring only trusted users have such access. 2) Monitor usage of the 'catlist' shortcode in posts and pages to detect unusual or unauthorized queries that could indicate exploitation attempts. 3) Temporarily disable or remove the 'List category posts' plugin if it is not essential to reduce the attack surface. 4) Apply strict content access policies and consider additional plugin or custom code to enforce access controls on post visibility beyond WordPress defaults. 5) Stay alert for official patches or updates from the plugin developer and apply them promptly once released. 6) Conduct regular security reviews of WordPress plugins and user roles to identify and mitigate similar risks. 7) Employ web application firewalls (WAFs) with rules to detect and block suspicious shortcode parameter usage patterns. These measures go beyond generic advice by focusing on role management, monitoring shortcode usage, and proactive plugin management tailored to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-06T16:21:36.559Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69058f8066e0c23159a8ccef

Added to database: 11/1/2025, 4:41:36 AM

Last enriched: 11/1/2025, 4:50:28 AM

Last updated: 11/1/2025, 3:10:07 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats