Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12681: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in ronalfy Comment Edit Core – Simple Comment Editing

0
Medium
VulnerabilityCVE-2025-12681cvecve-2025-12681cwe-200
Published: Thu Nov 13 2025 (11/13/2025, 07:27:53 UTC)
Source: CVE Database V5
Vendor/Project: ronalfy
Product: Comment Edit Core – Simple Comment Editing

Description

The Comment Edit Core – Simple Comment Editing plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.0 via the 'ajax_get_comment' function. This makes it possible for unauthenticated attackers to extract sensitive data including user IDs, IP addresses, and email addresses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:59:43 UTC

Technical Analysis

CVE-2025-12681 is a vulnerability classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. It affects the 'Comment Edit Core – Simple Comment Editing' plugin for WordPress, specifically versions up to and including 3.1.0. The vulnerability resides in the 'ajax_get_comment' function, which is accessible without authentication. This function improperly exposes sensitive user data such as user IDs, IP addresses, and email addresses to unauthenticated attackers. The flaw arises due to insufficient access controls on AJAX endpoints, allowing attackers to retrieve data that should be restricted. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, affecting only confidentiality without impacting integrity or availability. No patches are currently linked, and no known exploits have been observed in the wild. Given the widespread use of WordPress and the popularity of comment editing plugins, this vulnerability poses a notable risk to website operators and their users. Attackers could leverage the exposed data for reconnaissance, targeted phishing, or further exploitation of user accounts.

Potential Impact

The primary impact of CVE-2025-12681 is the unauthorized disclosure of sensitive user information, including user IDs, IP addresses, and email addresses. This breach of confidentiality can lead to privacy violations and undermine user trust. Exposed email addresses and IPs can be used for spear-phishing campaigns, social engineering, or brute force attacks against user accounts. While the vulnerability does not allow direct modification or disruption of site content, the information leakage can facilitate secondary attacks that compromise integrity or availability. Organizations operating WordPress sites with this plugin risk reputational damage, potential regulatory penalties related to data protection laws (e.g., GDPR), and increased exposure to targeted cyberattacks. The ease of exploitation without authentication and user interaction increases the likelihood of automated scanning and data harvesting by malicious actors.

Mitigation Recommendations

1. Immediately disable or uninstall the 'Comment Edit Core – Simple Comment Editing' plugin until a secure patched version is released. 2. If disabling the plugin is not feasible, restrict access to the vulnerable AJAX endpoint ('ajax_get_comment') by implementing IP whitelisting or authentication checks at the web server or application firewall level. 3. Monitor web server logs for unusual or repeated access attempts to the AJAX endpoint to detect potential exploitation attempts. 4. Educate site administrators on the risks of exposing sensitive data via plugins and encourage regular plugin updates and security audits. 5. Implement web application firewalls (WAFs) with rules to block unauthenticated access to sensitive AJAX functions. 6. Once a patch is available, apply it promptly and verify that the vulnerability is resolved by testing access controls on the AJAX endpoints. 7. Review and minimize the amount of sensitive data exposed through plugins and APIs to reduce attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-04T00:25:24.942Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691590f26cb36fb34fdfdf50

Added to database: 11/13/2025, 8:04:02 AM

Last enriched: 2/27/2026, 8:59:43 PM

Last updated: 3/24/2026, 3:18:53 PM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses