CVE-2025-11377: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in fernandobt List category posts
The List category posts plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.92.0 via the 'catlist' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-11377 affects the 'List category posts' WordPress plugin developed by fernandobt, specifically all versions up to and including 0.92.0. The issue is categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the 'catlist' shortcode functionality, which is designed to display posts from specified categories. Due to insufficient access control checks, authenticated users with contributor-level permissions or higher can manipulate the shortcode to include posts that are normally restricted, such as password-protected, private, or draft posts. This bypasses WordPress's standard content visibility restrictions, allowing unauthorized reading of sensitive content. The vulnerability requires the attacker to have at least contributor-level access, which is a relatively low privilege level in WordPress, making exploitation feasible in environments where such user roles are assigned. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality impact without integrity or availability effects. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress sites for content management, making this a relevant concern for many organizations relying on WordPress for their web presence.
Potential Impact
For European organizations, the primary impact of this vulnerability is unauthorized disclosure of sensitive or confidential information stored in WordPress posts that are intended to be restricted. This could include internal communications, draft content, or password-protected data that may contain business-sensitive information or personal data protected under GDPR. Exposure of such data could lead to reputational damage, regulatory penalties, and loss of trust. Since the vulnerability requires contributor-level access, the risk is heightened in environments where multiple users have such privileges, including agencies, media companies, educational institutions, and government bodies using WordPress. The vulnerability does not affect data integrity or availability, so the impact is limited to confidentiality breaches. However, the ease of exploitation via network and the common use of the affected plugin increase the likelihood of targeted attacks. Organizations with strict data protection requirements must consider this vulnerability a significant risk to their information security posture.
Mitigation Recommendations
To mitigate CVE-2025-11377, organizations should first verify if they use the 'List category posts' plugin and identify the installed version. Immediate mitigation includes restricting contributor-level access to only trusted users and auditing user roles to minimize unnecessary privileges. If possible, disable the 'catlist' shortcode or the plugin entirely until a patched version is released. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode usage patterns can provide temporary protection. Monitoring WordPress logs for unusual shortcode queries or access patterns by contributors can help detect exploitation attempts. Organizations should also ensure WordPress core and all plugins are regularly updated and subscribe to vulnerability advisories for timely patching once a fix is available. Additionally, consider hardening WordPress configurations to enforce stricter content access controls and review content classification to avoid storing highly sensitive data in draft or password-protected posts accessible via plugins.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11377: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in fernandobt List category posts
Description
The List category posts plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.92.0 via the 'catlist' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-11377 affects the 'List category posts' WordPress plugin developed by fernandobt, specifically all versions up to and including 0.92.0. The issue is categorized under CWE-200, which involves the exposure of sensitive information to unauthorized actors. The root cause lies in the 'catlist' shortcode functionality, which is designed to display posts from specified categories. Due to insufficient access control checks, authenticated users with contributor-level permissions or higher can manipulate the shortcode to include posts that are normally restricted, such as password-protected, private, or draft posts. This bypasses WordPress's standard content visibility restrictions, allowing unauthorized reading of sensitive content. The vulnerability requires the attacker to have at least contributor-level access, which is a relatively low privilege level in WordPress, making exploitation feasible in environments where such user roles are assigned. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) indicates network attack vector, low attack complexity, privileges required, no user interaction, unchanged scope, and limited confidentiality impact without integrity or availability effects. No patches or exploit code are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WordPress sites for content management, making this a relevant concern for many organizations relying on WordPress for their web presence.
Potential Impact
For European organizations, the primary impact of this vulnerability is unauthorized disclosure of sensitive or confidential information stored in WordPress posts that are intended to be restricted. This could include internal communications, draft content, or password-protected data that may contain business-sensitive information or personal data protected under GDPR. Exposure of such data could lead to reputational damage, regulatory penalties, and loss of trust. Since the vulnerability requires contributor-level access, the risk is heightened in environments where multiple users have such privileges, including agencies, media companies, educational institutions, and government bodies using WordPress. The vulnerability does not affect data integrity or availability, so the impact is limited to confidentiality breaches. However, the ease of exploitation via network and the common use of the affected plugin increase the likelihood of targeted attacks. Organizations with strict data protection requirements must consider this vulnerability a significant risk to their information security posture.
Mitigation Recommendations
To mitigate CVE-2025-11377, organizations should first verify if they use the 'List category posts' plugin and identify the installed version. Immediate mitigation includes restricting contributor-level access to only trusted users and auditing user roles to minimize unnecessary privileges. If possible, disable the 'catlist' shortcode or the plugin entirely until a patched version is released. Implementing web application firewalls (WAFs) with custom rules to detect and block suspicious shortcode usage patterns can provide temporary protection. Monitoring WordPress logs for unusual shortcode queries or access patterns by contributors can help detect exploitation attempts. Organizations should also ensure WordPress core and all plugins are regularly updated and subscribe to vulnerability advisories for timely patching once a fix is available. Additionally, consider hardening WordPress configurations to enforce stricter content access controls and review content classification to avoid storing highly sensitive data in draft or password-protected posts accessible via plugins.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-06T16:21:36.559Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69058f8066e0c23159a8ccef
Added to database: 11/1/2025, 4:41:36 AM
Last enriched: 11/10/2025, 2:07:16 AM
Last updated: 12/16/2025, 11:13:19 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-3261
UnknownCVE-2025-0836: CWE-862 Missing Authorization in Milestone Systems XProtect VMS
MediumUser Data Compromised in SoundCloud Hack
MediumCVE-2025-14002: CWE-287 Improper Authentication in whyun WPCOM Member
HighCVE-2025-13231: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in radykal Fancy Product Designer
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.