Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11693: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in recorp Export WP Pages to HTML & PDF – Simply Create a Static Website

0
Critical
VulnerabilityCVE-2025-11693cvecve-2025-11693cwe-200
Published: Sat Dec 13 2025 (12/13/2025, 04:31:33 UTC)
Source: CVE Database V5
Vendor/Project: recorp
Product: Export WP Pages to HTML & PDF – Simply Create a Static Website

Description

The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:10:52 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11693 affects the Export WP Pages to HTML & PDF – Simply Create a Static Website plugin for WordPress, specifically all versions up to and including 4.3.4. This plugin is designed to export WordPress pages into static HTML and PDF formats. The core issue is the exposure of sensitive authentication cookies through publicly accessible cookies.txt files generated during backup operations. When a site administrator or a user with elevated privileges triggers a backup, the plugin may inadvertently log authentication cookies into these files. Because these cookies are stored in a publicly accessible location without proper access controls, unauthenticated attackers can retrieve them. Possession of these cookies can allow attackers to impersonate privileged users, including administrators, leading to full site compromise. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The CVSS 3.1 score of 9.8 reflects the critical nature of this flaw, with an attack vector that is network-based, requiring no privileges or user interaction, and resulting in high confidentiality, integrity, and availability impacts. Although no exploits have been reported in the wild yet, the ease of exploitation and the severity of potential damage make this a significant threat to WordPress sites using this plugin.

Potential Impact

The impact of CVE-2025-11693 is severe for organizations relying on the affected WordPress plugin. Unauthorized access to authentication cookies can lead to complete site takeover, allowing attackers to modify content, inject malicious code, steal sensitive data, or disrupt website availability. This can result in reputational damage, loss of customer trust, data breaches, and potential regulatory penalties. E-commerce sites, government portals, and enterprises using WordPress for critical operations are particularly vulnerable. The vulnerability's ease of exploitation means attackers can quickly leverage it to gain persistent access without needing prior credentials or user interaction. Additionally, compromised sites can be used as launchpads for further attacks, including phishing or malware distribution, amplifying the threat's reach and impact.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict access controls on backup directories and any files named cookies.txt to prevent public access. Web server configurations should be reviewed and updated to restrict access to sensitive files generated by the plugin. Administrators should avoid triggering backups with elevated user roles until a patch or update is released. Monitoring and logging should be enhanced to detect unusual access patterns or unauthorized retrieval of backup files. If possible, disable or uninstall the Export WP Pages to HTML & PDF plugin until a secure version is available. Applying web application firewalls (WAFs) with rules to block access to backup files and sensitive cookie files can provide an additional layer of defense. Finally, once the vendor releases a patch, it should be applied promptly to fully remediate the vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-13T15:49:19.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef62d977419e584a4fcc

Added to database: 12/13/2025, 4:45:22 AM

Last enriched: 2/27/2026, 7:10:52 PM

Last updated: 3/26/2026, 3:28:55 AM

Views: 187

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses