Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12558: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in beaverbuilder Beaver Builder Page Builder – Drag and Drop Website Builder

0
Medium
VulnerabilityCVE-2025-12558cvecve-2025-12558cwe-200
Published: Tue Dec 09 2025 (12/09/2025, 13:51:07 UTC)
Source: CVE Database V5
Vendor/Project: beaverbuilder
Product: Beaver Builder Page Builder – Drag and Drop Website Builder

Description

CVE-2025-12558 is a medium-severity vulnerability in the Beaver Builder Page Builder WordPress plugin, affecting all versions up to 2. 9. 4. It allows authenticated users with Contributor-level access or higher to exploit the 'get_attachment_sizes' function to access sensitive information. Specifically, attackers can retrieve paths and metadata of private attachments, potentially exposing private files. The vulnerability does not require user interaction and can be exploited remotely with low complexity. While it does not impact integrity or availability, the confidentiality breach could lead to unauthorized data disclosure. No known exploits are reported in the wild as of now. European organizations using this plugin should prioritize patching or mitigating this issue to prevent sensitive data leaks. Countries with high WordPress usage and significant digital presence, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 12/16/2025, 14:31:47 UTC

Technical Analysis

CVE-2025-12558 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the Beaver Builder Page Builder plugin for WordPress, a widely used drag-and-drop website builder. The flaw exists in the 'get_attachment_sizes' function, which improperly exposes sensitive information related to private attachments. Authenticated users with Contributor-level permissions or higher can exploit this vulnerability to extract sensitive data such as file paths and metadata of private attachments that should otherwise remain inaccessible. This exposure could allow attackers to identify and potentially access private files, leading to confidentiality breaches. The vulnerability affects all versions up to and including 2.9.4. The CVSS v3.1 base score is 4.3 (medium severity), reflecting that the attack vector is network-based, requires low attack complexity, and privileges at the Contributor level, but does not require user interaction. The impact is limited to confidentiality, with no direct effect on integrity or availability. No patches were linked at the time of disclosure, and no known exploits have been reported in the wild. Given the plugin’s popularity in WordPress ecosystems, this vulnerability poses a risk to websites relying on Beaver Builder for content management, especially those hosting sensitive or private media. Attackers exploiting this flaw could gather information useful for further attacks or data leakage.

Potential Impact

For European organizations, the exposure of sensitive attachment metadata and file paths can lead to unauthorized disclosure of confidential information, potentially violating data protection regulations such as GDPR. This could result in reputational damage, legal penalties, and loss of customer trust. Organizations using Beaver Builder to manage websites with private or sensitive content are at risk of data leakage if Contributor-level access is granted to untrusted users or if accounts are compromised. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach could facilitate further attacks, such as targeted phishing or social engineering. The impact is particularly significant for sectors handling sensitive data, including finance, healthcare, and government institutions. Additionally, the ease of exploitation and network accessibility increase the likelihood of exploitation if mitigations are not applied promptly.

Mitigation Recommendations

European organizations should immediately audit user roles and permissions within their WordPress installations, ensuring that Contributor-level access is granted only to trusted users. Restricting or reviewing Contributor and higher privileges can reduce the attack surface. Monitoring and logging access to attachment metadata and private files can help detect suspicious activity. Organizations should stay vigilant for official patches or updates from Beaver Builder and apply them promptly once released. In the absence of a patch, consider implementing web application firewall (WAF) rules to block or monitor requests targeting the 'get_attachment_sizes' function or related endpoints. Additionally, limiting plugin usage to the minimum necessary and conducting regular security assessments of WordPress plugins can reduce exposure. Educating administrators and users about the risks of privilege escalation and sensitive data exposure is also recommended.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-31T17:03:15.524Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69382bbdabbdc4595cd8b6c6

Added to database: 12/9/2025, 2:01:33 PM

Last enriched: 12/16/2025, 2:31:47 PM

Last updated: 2/6/2026, 8:37:23 PM

Views: 127

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats