Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12512: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in edge22 GenerateBlocks

0
Medium
VulnerabilityCVE-2025-12512cvecve-2025-12512cwe-200
Published: Sat Dec 13 2025 (12/13/2025, 03:20:25 UTC)
Source: CVE Database V5
Vendor/Project: edge22
Product: GenerateBlocks

Description

The GenerateBlocks plugin for WordPress is vulnerable to information exposure due to missing object-level authorization checks in versions up to, and including, 2.1.2. This is due to the plugin registering multiple REST API routes under `generateblocks/v1/meta/` that gate access with `current_user_can('edit_posts')`, which is granted to low-privileged roles such as Contributor. The handlers accept arbitrary entity IDs (user IDs, post IDs, etc.) and meta keys, returning any requested metadata with only a short blacklist of password-like keys for protection. There is no object-level authorization ensuring the caller is requesting only their own data, and there is no allowlist of safe keys. This makes it possible for authenticated attackers, with Contributor-level access and above, to exfiltrate personally identifiable information (PII) and other sensitive profile data of administrator accounts or any other users by directly querying user meta keys via the exposed endpoints via the `get_user_meta_rest` function. In typical WordPress + WooCommerce setups, this includes names, email, phone, and address fields that WooCommerce stores in user meta, enabling targeted phishing, account takeover pretexting, and privacy breaches.

AI-Powered Analysis

AILast updated: 12/20/2025, 04:53:37 UTC

Technical Analysis

The GenerateBlocks plugin for WordPress, widely used for building block-based layouts, contains a vulnerability identified as CVE-2025-12512. This vulnerability arises from missing object-level authorization checks on several REST API routes registered under the namespace `generateblocks/v1/meta/`. These routes are protected only by the capability check `current_user_can('edit_posts')`, which is granted to low-privileged roles such as Contributors. The API handlers accept arbitrary entity identifiers (user IDs, post IDs) and meta keys, returning the corresponding metadata with only a minimal blacklist of sensitive keys (e.g., password-related keys) excluded. Critically, there is no verification that the requesting user is authorized to access the metadata of the specified entity, allowing an authenticated user with Contributor or higher privileges to query and retrieve sensitive metadata belonging to other users, including administrators. In typical WordPress installations integrated with WooCommerce, user meta contains personally identifiable information such as full names, email addresses, phone numbers, and physical addresses. This exposure can be leveraged for targeted phishing campaigns, social engineering, and pretexting attacks aimed at account takeover or privacy breaches. The vulnerability does not require user interaction beyond authentication and sending crafted REST API requests. The CVSS 3.1 base score is 4.3 (medium), reflecting the network attack vector, low complexity, and limited confidentiality impact without affecting integrity or availability. No known exploits are currently reported in the wild, and no official patches have been linked yet. However, the risk is significant given the sensitive nature of exposed data and the common use of GenerateBlocks and WooCommerce in WordPress sites.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive user information, including PII protected under GDPR. Exposure of names, emails, phone numbers, and addresses can facilitate targeted phishing and social engineering attacks, increasing the likelihood of account compromise and fraud. Organizations relying on WordPress with GenerateBlocks and WooCommerce may face reputational damage, regulatory penalties, and loss of customer trust if user data is leaked. The vulnerability affects confidentiality but does not impact data integrity or availability. Since exploitation requires authenticated access with Contributor-level privileges, the threat is primarily from insider threats or compromised low-privilege accounts. However, given the ease of exploitation via REST API calls, attackers who gain such access can escalate their impact by harvesting administrator and other privileged user data. This can lead to further attacks, including account takeover and lateral movement within the organization’s web infrastructure. The medium CVSS score reflects these factors, but the real-world impact could be higher if combined with other vulnerabilities or social engineering.

Mitigation Recommendations

European organizations should immediately audit their WordPress sites for the presence of the GenerateBlocks plugin and verify the version in use. Until an official patch is released, administrators should consider the following mitigations: 1) Restrict Contributor and other low-privilege user roles from accessing REST API endpoints by implementing custom capability checks or disabling the vulnerable endpoints via code or security plugins. 2) Employ Web Application Firewalls (WAFs) to detect and block suspicious REST API requests targeting `generateblocks/v1/meta/` routes, especially those with unusual user or meta key parameters. 3) Monitor logs for anomalous API access patterns indicative of data scraping or enumeration attempts. 4) Harden user account security by enforcing strong authentication, monitoring for compromised accounts, and limiting the number of users with Contributor or higher roles. 5) Remove or minimize storage of sensitive PII in user meta fields where possible, or encrypt sensitive metadata at rest. 6) Stay updated with vendor advisories and apply patches promptly once available. 7) Conduct user awareness training to recognize phishing attempts that may result from leaked data. These targeted mitigations go beyond generic advice by focusing on access control, monitoring, and data minimization specific to this vulnerability’s exploitation vector.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T15:01:41.942Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693ce0d37c4acd10e84d9254

Added to database: 12/13/2025, 3:43:15 AM

Last enriched: 12/20/2025, 4:53:37 AM

Last updated: 2/4/2026, 4:07:54 AM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats