CVE-2025-12010: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpkube Authors List
The Authors List plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.6.1 via the via arbitrary method call from Authors_List_Shortcode class. This makes it possible for authenticated attackers, with Contributor-level access and above, to call methods such as get_meta to extract sensitive user data including password hashes, email addresses, usernames, and activation keys via specially crafted shortcode attributes
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12010 affects the Authors List plugin for WordPress, specifically all versions up to and including 2.0.6.1. The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause is an arbitrary method call vulnerability within the Authors_List_Shortcode class, which processes shortcode attributes. Authenticated users with Contributor-level permissions or higher can exploit this flaw by crafting shortcode attributes that invoke internal methods such as get_meta. This method can retrieve sensitive user metadata including password hashes, email addresses, usernames, and activation keys. Since Contributors and above are typically allowed to create or edit content, they can embed these malicious shortcodes in posts or pages, triggering the data leak when the shortcode is rendered. The vulnerability does not require user interaction beyond the attacker’s own authenticated session and does not affect availability or integrity, but it severely compromises confidentiality. The CVSS v3.1 score is 6.5 (medium severity) with vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating network exploitability with low attack complexity, requiring privileges but no user interaction, and resulting in high confidentiality impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of user data stored in WordPress sites using the Authors List plugin. Exposure of password hashes and activation keys could facilitate credential stuffing, account takeover, or privilege escalation attacks. Email addresses and usernames leakage can aid phishing campaigns and social engineering attacks targeting employees or customers. Since Contributors and higher roles are common in content management workflows, insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability. The impact is particularly critical for organizations handling sensitive personal data under GDPR, as data breaches could lead to regulatory fines and reputational damage. Additionally, websites serving as customer portals, intranets, or community platforms are at higher risk. The vulnerability does not affect system availability or integrity directly but can be a stepping stone for further attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the Authors List plugin is installed and determine its version. Until an official patch is released, restrict Contributor and higher roles from adding or editing shortcodes or disable the Authors List plugin if feasible. Implement strict role-based access controls and monitor contributor activities for suspicious shortcode usage. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious shortcode attributes targeting the Authors_List_Shortcode class. Regularly update WordPress core and plugins, and subscribe to vendor advisories for patch releases. Conduct security awareness training for content editors about the risks of shortcode misuse. Consider scanning site content for unauthorized shortcodes and remove them. Finally, review user metadata access permissions and harden the WordPress environment by disabling unnecessary plugin features.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12010: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpkube Authors List
Description
The Authors List plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.0.6.1 via the via arbitrary method call from Authors_List_Shortcode class. This makes it possible for authenticated attackers, with Contributor-level access and above, to call methods such as get_meta to extract sensitive user data including password hashes, email addresses, usernames, and activation keys via specially crafted shortcode attributes
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12010 affects the Authors List plugin for WordPress, specifically all versions up to and including 2.0.6.1. The issue is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. The root cause is an arbitrary method call vulnerability within the Authors_List_Shortcode class, which processes shortcode attributes. Authenticated users with Contributor-level permissions or higher can exploit this flaw by crafting shortcode attributes that invoke internal methods such as get_meta. This method can retrieve sensitive user metadata including password hashes, email addresses, usernames, and activation keys. Since Contributors and above are typically allowed to create or edit content, they can embed these malicious shortcodes in posts or pages, triggering the data leak when the shortcode is rendered. The vulnerability does not require user interaction beyond the attacker’s own authenticated session and does not affect availability or integrity, but it severely compromises confidentiality. The CVSS v3.1 score is 6.5 (medium severity) with vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, indicating network exploitability with low attack complexity, requiring privileges but no user interaction, and resulting in high confidentiality impact. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of user data stored in WordPress sites using the Authors List plugin. Exposure of password hashes and activation keys could facilitate credential stuffing, account takeover, or privilege escalation attacks. Email addresses and usernames leakage can aid phishing campaigns and social engineering attacks targeting employees or customers. Since Contributors and higher roles are common in content management workflows, insider threats or compromised contributor accounts could be leveraged to exploit this vulnerability. The impact is particularly critical for organizations handling sensitive personal data under GDPR, as data breaches could lead to regulatory fines and reputational damage. Additionally, websites serving as customer portals, intranets, or community platforms are at higher risk. The vulnerability does not affect system availability or integrity directly but can be a stepping stone for further attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the Authors List plugin is installed and determine its version. Until an official patch is released, restrict Contributor and higher roles from adding or editing shortcodes or disable the Authors List plugin if feasible. Implement strict role-based access controls and monitor contributor activities for suspicious shortcode usage. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious shortcode attributes targeting the Authors_List_Shortcode class. Regularly update WordPress core and plugins, and subscribe to vendor advisories for patch releases. Conduct security awareness training for content editors about the risks of shortcode misuse. Consider scanning site content for unauthorized shortcodes and remove them. Finally, review user metadata access permissions and harden the WordPress environment by disabling unnecessary plugin features.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-21T12:38:07.051Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6912b13014bc3e00ba783d3c
Added to database: 11/11/2025, 3:44:48 AM
Last enriched: 11/18/2025, 5:38:00 AM
Last updated: 11/21/2025, 3:42:38 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13357: CWE-1188: Initialization of a Resource with an Insecure Default in HashiCorp Tooling
HighCVE-2025-41115: Vulnerability in Grafana Grafana Enterprise
CriticalCVE-2025-13432: CWE-863: Incorrect Authorization in HashiCorp Terraform Enterprise
MediumCVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
CriticalSliver C2 vulnerability enables attack on C2 operators through insecure Wireguard network
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.