Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13660: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in rcatheme Guest Support

0
Medium
VulnerabilityCVE-2025-13660cvecve-2025-13660cwe-200
Published: Fri Dec 12 2025 (12/12/2025, 06:32:56 UTC)
Source: CVE Database V5
Vendor/Project: rcatheme
Product: Guest Support

Description

The Guest Support plugin for WordPress is vulnerable to User Email Disclosure in versions up to, and including, 1.2.3. This is due to the plugin exposing a public AJAX endpoint that allows anyone to search for and retrieve user email addresses without any authentication or capability checks. This makes it possible for unauthenticated attackers to enumerate user accounts and extract email addresses via the guest_support_handler=ajax endpoint with the request=get_users parameter.

AI-Powered Analysis

AILast updated: 12/12/2025, 07:17:53 UTC

Technical Analysis

CVE-2025-13660 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the Guest Support plugin developed by rcatheme for WordPress. The flaw exists in versions up to and including 1.2.3, where a public AJAX endpoint (guest_support_handler=ajax) is exposed without any authentication or capability checks. This endpoint accepts a request parameter get_users that allows an attacker to enumerate user accounts and retrieve their associated email addresses. Because the endpoint is publicly accessible, any unauthenticated attacker can exploit this to harvest user emails from affected WordPress sites. The vulnerability does not impact the integrity or availability of the system but compromises confidentiality by leaking sensitive user information. The CVSS v3.1 base score is 5.3, indicating a medium severity level due to the ease of exploitation (network vector, no privileges required, no user interaction) but limited impact scope (only email disclosure). No patches or fixes are currently available, and no known exploits have been reported in the wild. This vulnerability could facilitate phishing campaigns or social engineering attacks by providing attackers with valid user email addresses. Organizations using the Guest Support plugin should monitor for updates and consider interim mitigations to restrict access to the vulnerable endpoint.

Potential Impact

The primary impact of CVE-2025-13660 is the unauthorized disclosure of user email addresses, which compromises user privacy and confidentiality. For European organizations, this can lead to increased risk of phishing attacks, spear-phishing campaigns, and social engineering targeting employees or customers. While the vulnerability does not allow direct system compromise or data manipulation, the leaked emails can serve as a foothold for further attacks, including credential stuffing or targeted malware delivery. Organizations handling sensitive or regulated data (e.g., GDPR-protected personal data) may face compliance risks and reputational damage if user information is exposed. The impact is particularly relevant for organizations with public-facing WordPress sites using the vulnerable plugin, especially those with large user bases. Although no integrity or availability impact exists, the breach of confidentiality alone can have significant operational and legal consequences in Europe due to strict data protection regulations.

Mitigation Recommendations

1. Monitor the rcatheme Guest Support plugin repository and official channels for security patches addressing CVE-2025-13660 and apply updates immediately upon release. 2. Until a patch is available, implement web application firewall (WAF) rules to block or restrict access to the guest_support_handler=ajax endpoint, especially requests containing the get_users parameter. 3. Restrict access to the AJAX endpoint by IP whitelisting or requiring authentication to prevent unauthenticated enumeration. 4. Conduct regular audits of WordPress plugins and remove or replace plugins that are no longer maintained or have known vulnerabilities. 5. Educate users and administrators about phishing risks and implement email filtering and anti-phishing technologies to mitigate the impact of leaked email addresses. 6. Review and enforce least privilege principles for WordPress user roles to limit exposure of sensitive data. 7. Monitor logs for unusual access patterns to the vulnerable endpoint to detect potential exploitation attempts early.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-25T16:08:54.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693bbde4e6d9263eb354937c

Added to database: 12/12/2025, 7:01:56 AM

Last enriched: 12/12/2025, 7:17:53 AM

Last updated: 12/12/2025, 11:28:48 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats