Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12010: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpkube Authors List

0
Medium
VulnerabilityCVE-2025-12010cvecve-2025-12010cwe-200
Published: Tue Nov 11 2025 (11/11/2025, 03:30:38 UTC)
Source: CVE Database V5
Vendor/Project: wpkube
Product: Authors List

Description

The Authors List plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.6.1 via the via arbitrary method call from Authors_List_Shortcode class. This makes it possible for authenticated attackers, with Contributor-level access and above, to call methods such as get_meta to extract sensitive user data including password hashes, email addresses, usernames, and activation keys via specially crafted shortcode attributes

AI-Powered Analysis

AILast updated: 11/18/2025, 05:38:00 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12010 affects the Authors List plugin for WordPress, specifically all versions up to and including 2.0.6.1. The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause is an arbitrary method call vulnerability within the Authors_List_Shortcode class, which processes shortcode attributes. Authenticated users with Contributor-level permissions or higher can exploit this flaw by crafting shortcode attributes that invoke internal methods such as get_meta. This method can retrieve sensitive user metadata including password hashes, email addresses, usernames, and activation keys. Since Contributors and above are typically allowed to create or edit content, they can embed these malicious shortcodes in posts or pages, triggering the data leak when the shortcode is rendered. The vulnerability does not require user interaction beyond the attacker’s own authenticated session and does not affect availability or integrity, but it severely compromises confidentiality. The CVSS v3.1 score is 6.5 (medium severity) with vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating network exploitability with low attack complexity, requiring privileges but no user interaction, and resulting in high confidentiality impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of user data stored in WordPress sites using the Authors List plugin. Exposure of password hashes and activation keys could facilitate credential stuffing, account takeover, or privilege escalation attacks. Email addresses and usernames leakage can aid phishing campaigns and social engineering attacks targeting employees or customers. Since Contributors and higher roles are common in content management workflows, insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability. The impact is particularly critical for organizations handling sensitive personal data under GDPR, as data breaches could lead to regulatory fines and reputational damage. Additionally, websites serving as customer portals, intranets, or community platforms are at higher risk. The vulnerability does not affect system availability or integrity directly but can be a stepping stone for further attacks.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify if the Authors List plugin is installed and determine its version. Until an official patch is released, restrict Contributor and higher roles from adding or editing shortcodes or disable the Authors List plugin if feasible. Implement strict role-based access controls and monitor contributor activities for suspicious shortcode usage. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious shortcode attributes targeting the Authors_List_Shortcode class. Regularly update WordPress core and plugins, and subscribe to vendor advisories for patch releases. Conduct security awareness training for content editors about the risks of shortcode misuse. Consider scanning site content for unauthorized shortcodes and remove them. Finally, review user metadata access permissions and harden the WordPress environment by disabling unnecessary plugin features.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-21T12:38:07.051Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6912b13014bc3e00ba783d3c

Added to database: 11/11/2025, 3:44:48 AM

Last enriched: 11/18/2025, 5:38:00 AM

Last updated: 11/21/2025, 3:42:38 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats