Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12492: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ultimatemember Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

0
Medium
VulnerabilityCVE-2025-12492cvecve-2025-12492cwe-200
Published: Sat Dec 20 2025 (12/20/2025, 08:22:10 UTC)
Source: CVE Database V5
Vendor/Project: ultimatemember
Product: Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin

Description

The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.11.0 via the ajax_get_members function. This is due to the use of a predictable low-entropy token (5 hex characters derived from md5 of post ID) to identify member directories and insufficient authorization checks on the unauthenticated AJAX endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs by enumerating predictable directory_id values or brute-forcing the small 16^5 token space.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:37:58 UTC

Technical Analysis

CVE-2025-12492 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Ultimate Member plugin for WordPress, specifically versions up to and including 2.11.0. The flaw resides in the ajax_get_members function, which exposes sensitive user data through an unauthenticated AJAX endpoint. The root cause is twofold: first, the plugin uses a predictable, low-entropy token to identify member directories. This token is a 5-character hexadecimal string derived from the MD5 hash of the post ID, resulting in a token space of only 16^5 (approximately 1 million possibilities). Second, the endpoint lacks sufficient authorization checks, allowing any unauthenticated user to query it. Attackers can enumerate or brute-force these tokens to retrieve sensitive information such as usernames, display names, user roles (including administrator accounts), profile URLs, and user IDs. This information leakage can facilitate further targeted attacks, social engineering, or privilege escalation attempts. The vulnerability is remotely exploitable over the network without requiring authentication or user interaction, increasing its risk profile. Although no exploits have been reported in the wild yet, the ease of exploitation and the sensitive nature of the data exposed make this a significant concern for websites using this plugin. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the impact on confidentiality without affecting integrity or availability.

Potential Impact

The primary impact of CVE-2025-12492 is the unauthorized disclosure of sensitive user information, which can compromise user privacy and organizational security. Exposure of usernames and user roles, especially administrator accounts, can enable attackers to conduct targeted phishing, social engineering, or brute-force attacks against privileged accounts. Knowledge of profile URLs and user IDs can assist in reconnaissance and facilitate further exploitation or identity theft. While the vulnerability does not directly allow modification or disruption of data or services, the confidentiality breach can lead to indirect impacts such as account takeover or reputational damage. Organizations relying on the Ultimate Member plugin for membership management, user registration, and content restriction are at risk of leaking sensitive user data to unauthenticated attackers. This risk is heightened for websites with high-value user accounts or sensitive user communities. The vulnerability affects all versions up to 2.11.0, so any unpatched installations remain vulnerable. The lack of known exploits in the wild suggests limited active exploitation currently, but the simplicity of the attack vector means this could change rapidly once widely known.

Mitigation Recommendations

To mitigate CVE-2025-12492, organizations should take the following specific actions: 1) Upgrade the Ultimate Member plugin to a version where this vulnerability is patched once available. Since no patch links are currently provided, monitor vendor advisories closely. 2) Implement web application firewall (WAF) rules to block or rate-limit requests to the ajax_get_members AJAX endpoint, especially those attempting to enumerate or brute-force directory_id tokens. 3) Restrict access to the AJAX endpoint by requiring authentication or validating user permissions before processing requests. 4) Increase the entropy of tokens used to identify member directories, replacing predictable MD5-derived tokens with cryptographically secure random values. 5) Conduct regular audits of user data exposure and monitor logs for suspicious access patterns targeting this endpoint. 6) If immediate patching is not possible, consider disabling the vulnerable AJAX functionality or limiting plugin features that expose member directories. 7) Educate site administrators on the risks of exposing sensitive user information and encourage strong password policies and multi-factor authentication to mitigate downstream risks from leaked user data.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-29T20:02:17.937Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69465e70aa65b5798e1d3c75

Added to database: 12/20/2025, 8:29:36 AM

Last enriched: 2/27/2026, 8:37:58 PM

Last updated: 3/25/2026, 10:04:41 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses