Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12540: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in sharethis ShareThis Dashboard for Google Analytics

0
Medium
VulnerabilityCVE-2025-12540cvecve-2025-12540cwe-200
Published: Wed Jan 07 2026 (01/07/2026, 08:21:52 UTC)
Source: CVE Database V5
Vendor/Project: sharethis
Product: ShareThis Dashboard for Google Analytics

Description

The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.2.4. This is due to the Google Analytics client_ID and client_secret being stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to craft a link to the sharethis.com server, which will share an authorization token for Google Analytics with a malicious website, if the attacker can trick an administrator logged into the website and Google Analytics to click the link.

AI-Powered Analysis

AILast updated: 01/07/2026, 08:54:55 UTC

Technical Analysis

CVE-2025-12540 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the ShareThis Dashboard for Google Analytics plugin for WordPress, specifically all versions up to and including 3.2.4. The core issue arises because the Google Analytics client_ID and client_secret credentials are stored in plaintext within the publicly accessible plugin source code. This exposure allows unauthenticated attackers to craft malicious URLs targeting the sharethis.com server. If an administrator who is simultaneously logged into the WordPress site and Google Analytics clicks such a crafted link, an authorization token for Google Analytics can be inadvertently shared with a malicious third-party website. This token sharing compromises the confidentiality of Google Analytics data but does not directly impact data integrity or availability. The attack vector requires no authentication from the attacker but does require user interaction, specifically the administrator clicking the malicious link. The vulnerability has a CVSS v3.1 base score of 4.7, indicating medium severity, with the vector string AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N, highlighting network attack vector, low attack complexity, no privileges required, user interaction required, scope changed, and limited confidentiality impact. No patches or exploits in the wild have been reported as of the publication date. The vulnerability is significant because it exposes sensitive OAuth credentials that could be used to access or manipulate Google Analytics data, potentially leading to privacy breaches or unauthorized data collection. The exposure is exacerbated by the fact that the credentials are embedded in publicly visible source code, making discovery trivial for attackers scanning vulnerable sites.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of Google Analytics credentials, which can lead to privacy violations and unauthorized access to web analytics data. This could undermine trust in data integrity and confidentiality, potentially affecting compliance with GDPR and other data protection regulations. Attackers gaining access to Google Analytics tokens might harvest sensitive user behavior data or manipulate analytics reports, impacting marketing decisions and business intelligence. Although the vulnerability does not allow direct modification or denial of service, the exposure of credentials can facilitate further attacks or data leakage. Organizations relying heavily on digital marketing and analytics platforms are particularly vulnerable, as compromised analytics data could reveal strategic insights or customer behavior patterns. The requirement for administrator interaction reduces the likelihood of widespread exploitation but does not eliminate risk, especially in environments where administrators may be targeted by phishing or social engineering. The vulnerability also increases the attack surface for supply chain attacks if attackers leverage the exposed credentials to infiltrate connected systems or services.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the presence of the ShareThis Dashboard for Google Analytics plugin and verify the plugin version. If running a vulnerable version (up to 3.2.4), they should remove or update the plugin once a patch is available. In the absence of a patch, organizations should manually remove or obfuscate the Google Analytics client_ID and client_secret from the plugin source code to prevent exposure. Restricting access to plugin source files via web server configuration (e.g., using .htaccess rules or equivalent) can reduce public visibility of sensitive files. Administrators should be trained to recognize and avoid clicking suspicious links, especially those that could trigger token sharing. Implementing multi-factor authentication (MFA) for WordPress and Google Analytics accounts can reduce the risk of unauthorized access even if tokens are compromised. Monitoring network traffic and logs for unusual authorization token exchanges or access patterns can help detect exploitation attempts. Finally, organizations should consider using environment variables or secure vaults to store sensitive credentials instead of embedding them in plugin code.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-30T23:18:03.695Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e1b2fa55ed4ed998cb630

Added to database: 1/7/2026, 8:37:03 AM

Last enriched: 1/7/2026, 8:54:55 AM

Last updated: 1/8/2026, 6:01:36 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats