CVE-2025-11891: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in shelfplanner Shelf Planner
The Shelf Planner plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.0 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.
AI Analysis
Technical Summary
CVE-2025-11891 identifies a vulnerability in the Shelf Planner plugin for WordPress, affecting all versions up to and including 2.7.0. The vulnerability is classified under CWE-538, which involves the insertion of sensitive information into files or directories accessible externally. Specifically, Shelf Planner creates log files that are publicly accessible without authentication, exposing potentially sensitive information such as internal system details, user data, or configuration parameters. This exposure occurs because the plugin does not properly restrict access permissions on these log files, allowing unauthenticated remote attackers to retrieve them via standard HTTP requests. The vulnerability does not require any user interaction or privileges, making exploitation straightforward. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and limited confidentiality impact. Although no known exploits have been reported in the wild, the presence of sensitive information in publicly accessible logs can facilitate further attacks such as credential harvesting, targeted phishing, or exploitation of other vulnerabilities. The vulnerability highlights a common security oversight in plugin development related to secure logging and file permission management.
Potential Impact
The primary impact of CVE-2025-11891 is the unauthorized disclosure of sensitive information, which can compromise confidentiality. Organizations using the Shelf Planner plugin may inadvertently expose internal data, including potentially sensitive business or user information, through publicly accessible logs. This exposure can aid attackers in reconnaissance, enabling them to identify system configurations, user credentials, or other exploitable details. Although the vulnerability does not affect integrity or availability, the leaked information could be leveraged in multi-stage attacks, increasing the overall risk profile. For e-commerce and business websites relying on Shelf Planner for inventory or shelf management, this could lead to reputational damage, loss of customer trust, and potential regulatory compliance issues if personal data is exposed. The ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic scanning and data harvesting by attackers. However, the lack of known exploits in the wild suggests that the vulnerability is not yet actively targeted, providing a window for remediation.
Mitigation Recommendations
To mitigate CVE-2025-11891, organizations should immediately restrict access to the Shelf Planner plugin’s log files by configuring web server permissions and access controls to prevent public access. This can be achieved by implementing .htaccess rules, web server configuration directives, or firewall policies that deny HTTP requests to log file directories. Updating the Shelf Planner plugin to a patched version once available is critical; until then, consider disabling logging features or the plugin if feasible. Conduct a thorough audit of all publicly accessible files and directories related to the plugin to identify and secure any other sensitive data exposures. Additionally, monitor web server logs for unusual access patterns targeting log files or plugin directories. Employ web application firewalls (WAFs) to detect and block unauthorized attempts to access sensitive files. Finally, educate development and operations teams on secure logging practices, ensuring sensitive information is never written to publicly accessible locations in future deployments.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-11891: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in shelfplanner Shelf Planner
Description
The Shelf Planner plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.0 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-11891 identifies a vulnerability in the Shelf Planner plugin for WordPress, affecting all versions up to and including 2.7.0. The vulnerability is classified under CWE-538, which involves the insertion of sensitive information into files or directories accessible externally. Specifically, Shelf Planner creates log files that are publicly accessible without authentication, exposing potentially sensitive information such as internal system details, user data, or configuration parameters. This exposure occurs because the plugin does not properly restrict access permissions on these log files, allowing unauthenticated remote attackers to retrieve them via standard HTTP requests. The vulnerability does not require any user interaction or privileges, making exploitation straightforward. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and limited confidentiality impact. Although no known exploits have been reported in the wild, the presence of sensitive information in publicly accessible logs can facilitate further attacks such as credential harvesting, targeted phishing, or exploitation of other vulnerabilities. The vulnerability highlights a common security oversight in plugin development related to secure logging and file permission management.
Potential Impact
The primary impact of CVE-2025-11891 is the unauthorized disclosure of sensitive information, which can compromise confidentiality. Organizations using the Shelf Planner plugin may inadvertently expose internal data, including potentially sensitive business or user information, through publicly accessible logs. This exposure can aid attackers in reconnaissance, enabling them to identify system configurations, user credentials, or other exploitable details. Although the vulnerability does not affect integrity or availability, the leaked information could be leveraged in multi-stage attacks, increasing the overall risk profile. For e-commerce and business websites relying on Shelf Planner for inventory or shelf management, this could lead to reputational damage, loss of customer trust, and potential regulatory compliance issues if personal data is exposed. The ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic scanning and data harvesting by attackers. However, the lack of known exploits in the wild suggests that the vulnerability is not yet actively targeted, providing a window for remediation.
Mitigation Recommendations
To mitigate CVE-2025-11891, organizations should immediately restrict access to the Shelf Planner plugin’s log files by configuring web server permissions and access controls to prevent public access. This can be achieved by implementing .htaccess rules, web server configuration directives, or firewall policies that deny HTTP requests to log file directories. Updating the Shelf Planner plugin to a patched version once available is critical; until then, consider disabling logging features or the plugin if feasible. Conduct a thorough audit of all publicly accessible files and directories related to the plugin to identify and secure any other sensitive data exposures. Additionally, monitor web server logs for unusual access patterns targeting log files or plugin directories. Employ web application firewalls (WAFs) to detect and block unauthorized attempts to access sensitive files. Finally, educate development and operations teams on secure logging practices, ensuring sensitive information is never written to publicly accessible locations in future deployments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-16T19:06:56.650Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912b13014bc3e00ba783d18
Added to database: 11/11/2025, 3:44:48 AM
Last enriched: 2/27/2026, 7:39:16 PM
Last updated: 3/25/2026, 4:40:53 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.