CVE-2025-12558: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4 via the 'get_attachment_sizes' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the path and meta data of private attachments, which can be used to view the attachments.
AI Analysis
Technical Summary
CVE-2025-12558 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Beaver Builder Page Builder plugin for WordPress, specifically all versions up to and including 2.9.4. The vulnerability arises from the 'get_attachment_sizes' function, which improperly exposes sensitive data related to private attachments. Authenticated attackers with at least Contributor-level privileges can exploit this flaw to retrieve the file paths and metadata of private attachments that should otherwise be inaccessible. This exposure could allow attackers to gain insights into the structure and contents of private files, potentially facilitating further attacks or unauthorized data access. The vulnerability has a CVSS v3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low attack complexity, and requiring privileges but no user interaction. The scope remains unchanged, and the impact is limited to confidentiality loss without affecting integrity or availability. No patches or exploit code are currently publicly available, but the vulnerability is officially published and should be addressed promptly by site administrators.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information, specifically private attachment paths and metadata within WordPress sites using the affected Beaver Builder plugin. This can lead to privacy violations and could aid attackers in mapping the file structure or identifying sensitive content for further exploitation. Although the vulnerability requires authenticated access at Contributor level or higher, many WordPress sites allow user registrations or have multiple contributors, increasing the risk of exploitation. The exposure does not directly compromise system integrity or availability but can undermine trust and confidentiality, especially for sites handling sensitive or proprietary content. Organizations relying on Beaver Builder for content management may face data leakage risks, regulatory compliance issues, and reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2025-12558, organizations should first check for and apply any official patches or updates released by the Beaver Builder development team once available. Until a patch is released, administrators should restrict Contributor-level access and above to trusted users only, minimizing the number of accounts that can exploit this vulnerability. Implementing strict user role management and auditing user permissions can reduce exposure. Additionally, consider disabling or limiting the use of the affected 'get_attachment_sizes' functionality if feasible through plugin settings or custom code. Monitoring logs for unusual access patterns to attachment metadata and private files can help detect exploitation attempts. Employing a Web Application Firewall (WAF) with rules targeting suspicious authenticated requests may provide temporary protection. Finally, educating site administrators and contributors about the risks and signs of exploitation is recommended.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2025-12558: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder
Description
The Beaver Builder – WordPress Page Builder plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.4 via the 'get_attachment_sizes' function. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including the path and meta data of private attachments, which can be used to view the attachments.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12558 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Beaver Builder Page Builder plugin for WordPress, specifically all versions up to and including 2.9.4. The vulnerability arises from the 'get_attachment_sizes' function, which improperly exposes sensitive data related to private attachments. Authenticated attackers with at least Contributor-level privileges can exploit this flaw to retrieve the file paths and metadata of private attachments that should otherwise be inaccessible. This exposure could allow attackers to gain insights into the structure and contents of private files, potentially facilitating further attacks or unauthorized data access. The vulnerability has a CVSS v3.1 base score of 4.3, indicating medium severity, with an attack vector of network, low attack complexity, and requiring privileges but no user interaction. The scope remains unchanged, and the impact is limited to confidentiality loss without affecting integrity or availability. No patches or exploit code are currently publicly available, but the vulnerability is officially published and should be addressed promptly by site administrators.
Potential Impact
The primary impact of this vulnerability is the unauthorized disclosure of sensitive information, specifically private attachment paths and metadata within WordPress sites using the affected Beaver Builder plugin. This can lead to privacy violations and could aid attackers in mapping the file structure or identifying sensitive content for further exploitation. Although the vulnerability requires authenticated access at Contributor level or higher, many WordPress sites allow user registrations or have multiple contributors, increasing the risk of exploitation. The exposure does not directly compromise system integrity or availability but can undermine trust and confidentiality, especially for sites handling sensitive or proprietary content. Organizations relying on Beaver Builder for content management may face data leakage risks, regulatory compliance issues, and reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2025-12558, organizations should first check for and apply any official patches or updates released by the Beaver Builder development team once available. Until a patch is released, administrators should restrict Contributor-level access and above to trusted users only, minimizing the number of accounts that can exploit this vulnerability. Implementing strict user role management and auditing user permissions can reduce exposure. Additionally, consider disabling or limiting the use of the affected 'get_attachment_sizes' functionality if feasible through plugin settings or custom code. Monitoring logs for unusual access patterns to attachment metadata and private files can help detect exploitation attempts. Employing a Web Application Firewall (WAF) with rules targeting suspicious authenticated requests may provide temporary protection. Finally, educating site administrators and contributors about the risks and signs of exploitation is recommended.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-31T17:03:15.524Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69382bbdabbdc4595cd8b6c6
Added to database: 12/9/2025, 2:01:33 PM
Last enriched: 2/27/2026, 8:44:27 PM
Last updated: 3/25/2026, 4:39:50 AM
Views: 164
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.