Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11891: CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory in shelfplanner Shelf Planner

0
Medium
VulnerabilityCVE-2025-11891cvecve-2025-11891cwe-538
Published: Tue Nov 11 2025 (11/11/2025, 03:30:32 UTC)
Source: CVE Database V5
Vendor/Project: shelfplanner
Product: Shelf Planner

Description

The Shelf Planner plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.7.0 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:39:16 UTC

Technical Analysis

CVE-2025-11891 identifies a vulnerability in the Shelf Planner plugin for WordPress, affecting all versions up to and including 2.7.0. The vulnerability is classified under CWE-538, which involves the insertion of sensitive information into files or directories accessible externally. Specifically, Shelf Planner creates log files that are publicly accessible without authentication, exposing potentially sensitive information such as internal system details, user data, or configuration parameters. This exposure occurs because the plugin does not properly restrict access permissions on these log files, allowing unauthenticated remote attackers to retrieve them via standard HTTP requests. The vulnerability does not require any user interaction or privileges, making exploitation straightforward. The CVSS v3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and limited confidentiality impact. Although no known exploits have been reported in the wild, the presence of sensitive information in publicly accessible logs can facilitate further attacks such as credential harvesting, targeted phishing, or exploitation of other vulnerabilities. The vulnerability highlights a common security oversight in plugin development related to secure logging and file permission management.

Potential Impact

The primary impact of CVE-2025-11891 is the unauthorized disclosure of sensitive information, which can compromise confidentiality. Organizations using the Shelf Planner plugin may inadvertently expose internal data, including potentially sensitive business or user information, through publicly accessible logs. This exposure can aid attackers in reconnaissance, enabling them to identify system configurations, user credentials, or other exploitable details. Although the vulnerability does not affect integrity or availability, the leaked information could be leveraged in multi-stage attacks, increasing the overall risk profile. For e-commerce and business websites relying on Shelf Planner for inventory or shelf management, this could lead to reputational damage, loss of customer trust, and potential regulatory compliance issues if personal data is exposed. The ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic scanning and data harvesting by attackers. However, the lack of known exploits in the wild suggests that the vulnerability is not yet actively targeted, providing a window for remediation.

Mitigation Recommendations

To mitigate CVE-2025-11891, organizations should immediately restrict access to the Shelf Planner plugin’s log files by configuring web server permissions and access controls to prevent public access. This can be achieved by implementing .htaccess rules, web server configuration directives, or firewall policies that deny HTTP requests to log file directories. Updating the Shelf Planner plugin to a patched version once available is critical; until then, consider disabling logging features or the plugin if feasible. Conduct a thorough audit of all publicly accessible files and directories related to the plugin to identify and secure any other sensitive data exposures. Additionally, monitor web server logs for unusual access patterns targeting log files or plugin directories. Employ web application firewalls (WAFs) to detect and block unauthorized attempts to access sensitive files. Finally, educate development and operations teams on secure logging practices, ensuring sensitive information is never written to publicly accessible locations in future deployments.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-16T19:06:56.650Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912b13014bc3e00ba783d18

Added to database: 11/11/2025, 3:44:48 AM

Last enriched: 2/27/2026, 7:39:16 PM

Last updated: 3/25/2026, 4:40:53 PM

Views: 77

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses