Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12540: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in sharethis ShareThis Dashboard for Google Analytics

0
Medium
VulnerabilityCVE-2025-12540cvecve-2025-12540cwe-200
Published: Wed Jan 07 2026 (01/07/2026, 08:21:52 UTC)
Source: CVE Database V5
Vendor/Project: sharethis
Product: ShareThis Dashboard for Google Analytics

Description

CVE-2025-12540 is a medium-severity vulnerability in the ShareThis Dashboard for Google Analytics WordPress plugin (up to version 3. 2. 4) that exposes sensitive Google Analytics credentials in plaintext within the publicly accessible plugin source code. This exposure allows unauthenticated attackers to craft malicious links that, if clicked by an administrator logged into both the WordPress site and Google Analytics, can result in the unauthorized sharing of an authorization token with a malicious website. The vulnerability does not directly impact system integrity or availability but risks confidentiality by leaking client_ID and client_secret values. Exploitation requires user interaction (administrator clicking a crafted link), and no prior authentication is needed for the attacker. No known exploits are currently reported in the wild. European organizations using this plugin are at risk, especially those with administrators who have Google Analytics access and who may be targeted via phishing or social engineering. Mitigation involves removing or updating the plugin to a fixed version once available, restricting access to plugin source files, and educating administrators about phishing risks. Countries with high WordPress usage and significant digital marketing activities, such as Germany, France, the UK, and the Netherlands, are more likely to be affected.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:34:32 UTC

Technical Analysis

The ShareThis Dashboard for Google Analytics plugin for WordPress, versions up to and including 3.2.4, contains a vulnerability classified as CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The root cause is the storage of Google Analytics client_ID and client_secret credentials in plaintext within the publicly accessible plugin source code. This exposure allows unauthenticated attackers to craft malicious URLs targeting the sharethis.com server. If an administrator who is logged into both the WordPress site and Google Analytics clicks such a link, the attacker can cause the authorization token for Google Analytics to be shared with a malicious website. This token leakage compromises the confidentiality of Google Analytics data and potentially allows unauthorized access to analytics information. The vulnerability does not require the attacker to have any privileges on the WordPress site, but exploitation depends on successful social engineering to convince an administrator to click the crafted link (user interaction required). The CVSS v3.1 score is 4.7 (medium severity), reflecting network attack vector, low complexity, no privileges required, but requiring user interaction and impacting confidentiality only. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability affects all versions up to 3.2.4, and the plugin is used primarily by websites leveraging Google Analytics integration via ShareThis for social sharing and analytics purposes.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality of Google Analytics credentials and data. Unauthorized access to Google Analytics tokens could allow attackers to view sensitive website traffic data, user behavior analytics, and potentially manipulate analytics configurations. This exposure could lead to privacy compliance issues under GDPR if personal data insights are accessed or leaked. The risk is heightened for organizations with administrators who have elevated access to both WordPress and Google Analytics and who may be targeted by phishing campaigns. While the vulnerability does not directly impact system integrity or availability, the leakage of credentials could facilitate further attacks or data misuse. Organizations relying heavily on digital marketing and analytics for business decisions may suffer reputational damage if analytics data is compromised. The requirement for user interaction limits automated exploitation but does not eliminate risk, especially in environments where administrators may be less security-aware.

Mitigation Recommendations

1. Immediately audit and remove the vulnerable ShareThis Dashboard for Google Analytics plugin or update it to a patched version once available. 2. Restrict public access to plugin source files by configuring web server rules (e.g., .htaccess or nginx configs) to prevent unauthorized viewing of plugin directories. 3. Educate WordPress administrators about phishing and social engineering risks, emphasizing caution when clicking links, especially those related to analytics or plugin services. 4. Implement multi-factor authentication (MFA) for administrator accounts to reduce the risk of compromised credentials. 5. Regularly review Google Analytics account activity and revoke any suspicious or unauthorized tokens. 6. Monitor network traffic and logs for unusual outbound connections to sharethis.com or other suspicious domains. 7. Consider isolating Google Analytics credentials from publicly accessible codebases by using environment variables or secure vaults. 8. Employ Content Security Policy (CSP) headers to limit the domains that can be contacted from the WordPress admin interface. 9. Conduct regular security assessments of WordPress plugins and dependencies to identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T23:18:03.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb630

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 1/14/2026, 3:34:32 PM

Last updated: 2/7/2026, 12:48:00 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats