Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12540: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in sharethis ShareThis Dashboard for Google Analytics

0
Medium
VulnerabilityCVE-2025-12540cvecve-2025-12540cwe-200
Published: Wed Jan 07 2026 (01/07/2026, 08:21:52 UTC)
Source: CVE Database V5
Vendor/Project: sharethis
Product: ShareThis Dashboard for Google Analytics

Description

The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.4. This is due to the Google Analytics client_ID and client_secret being stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to craft a link to the sharethis.com server, which will share an authorization token for Google Analytics with a malicious website, if the attacker can trick an administrator logged into the website and Google Analytics to click the link.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:43:45 UTC

Technical Analysis

CVE-2025-12540 affects the ShareThis Dashboard for Google Analytics plugin for WordPress, specifically all versions up to and including 3.2.4. The vulnerability arises because the plugin stores Google Analytics client_ID and client_secret credentials in plaintext within the publicly accessible plugin source code. This exposure constitutes a CWE-200 (Exposure of Sensitive Information) vulnerability. An unauthenticated attacker can exploit this by crafting a malicious URL that, when clicked by an administrator who is simultaneously logged into the WordPress site and Google Analytics, causes the administrator's Google Analytics authorization token to be shared with the attacker’s website. This attack vector leverages the administrator's session and requires user interaction (clicking the crafted link). The vulnerability does not require the attacker to authenticate to the WordPress site or Google Analytics, increasing its risk. The CVSS v3.1 base score is 4.7 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction and impacting confidentiality with a scope change. There are no known exploits in the wild at this time, and no patches have been linked yet. The vulnerability could allow attackers to gain unauthorized access to Google Analytics data, potentially exposing sensitive analytics information and user behavior data. The exposure of client credentials in plaintext also increases the risk of further abuse if attackers extract these credentials from the plugin source.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive Google Analytics credentials and authorization tokens, which compromises the confidentiality of analytics data. Attackers gaining access to Google Analytics data can view sensitive website traffic patterns, user behavior, and potentially other private metrics that organizations rely on for business intelligence and security monitoring. While the vulnerability does not directly affect data integrity or availability, the exposure of credentials could facilitate further attacks, such as impersonation or unauthorized data collection. Organizations relying on this plugin risk data leakage that could undermine competitive advantage, violate privacy regulations, or expose user data indirectly. The requirement for user interaction (administrator clicking a malicious link) somewhat limits exploitation but does not eliminate risk, especially in environments where administrators may be targeted with phishing or social engineering. The scope change in CVSS indicates that the vulnerability can affect resources beyond the initially vulnerable component, potentially impacting the broader Google Analytics environment linked to the compromised credentials.

Mitigation Recommendations

Organizations should immediately audit their use of the ShareThis Dashboard for Google Analytics plugin and identify if they are running affected versions (up to 3.2.4). Until an official patch is released, administrators should consider disabling or uninstalling the plugin to prevent exposure. If disabling is not feasible, restrict access to the plugin source files via web server configuration to prevent public access to sensitive credentials. Educate administrators about the risks of clicking unknown or suspicious links, especially when logged into critical services like WordPress and Google Analytics. Implement multi-factor authentication (MFA) on Google Analytics accounts to reduce the impact of stolen tokens. Monitor Google Analytics account activity for unusual access patterns or data exports. Once a patch is available, apply it promptly. Additionally, rotate Google Analytics client_ID and client_secret credentials to invalidate any potentially exposed secrets. Employ Content Security Policy (CSP) and other browser security mechanisms to limit the impact of malicious links. Finally, consider isolating administrative sessions from general browsing to reduce the risk of token leakage via crafted URLs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T23:18:03.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb630

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 2/27/2026, 8:43:45 PM

Last updated: 3/25/2026, 2:33:11 AM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses