CVE-2025-13920: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpdirectorykit WP Directory Kit
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
AI Analysis
Technical Summary
CVE-2025-13920 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the WP Directory Kit plugin for WordPress in all versions up to and including 1.4.9. The flaw resides in the wdk_public_action AJAX handler, which improperly exposes email addresses of users assigned Directory Kit-specific roles without requiring any authentication or user interaction. This means that an unauthenticated attacker can send crafted requests to this AJAX endpoint and retrieve sensitive user email information. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date (January 24, 2026). The vulnerability is significant because email addresses can be leveraged for phishing campaigns, social engineering, or further targeted attacks against organizations using this plugin. The plugin is typically used to manage directories and user roles within WordPress sites, which are common in business, educational, and community websites. The lack of a patch or update at the time of reporting requires organizations to implement interim mitigations to protect sensitive user data.
Potential Impact
For European organizations, the exposure of user email addresses can lead to increased risk of phishing attacks, spear-phishing, and social engineering, potentially compromising user accounts or internal systems if attackers leverage the harvested emails effectively. Organizations relying on WP Directory Kit for managing user directories or role-based access on WordPress sites may face reputational damage and loss of user trust if sensitive information is leaked. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can be a stepping stone for more severe attacks. Given the widespread use of WordPress in Europe, especially in sectors like education, government, and SMEs, the impact could be significant if exploited at scale. The absence of authentication and user interaction requirements lowers the barrier for exploitation, increasing the threat surface. However, the lack of known exploits in the wild suggests limited immediate risk but does not preclude future exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if WP Directory Kit plugin versions up to 1.4.9 are in use. Until an official patch is released, organizations should restrict access to the wdk_public_action AJAX handler by implementing web application firewall (WAF) rules that block or limit requests to this endpoint from untrusted sources. Additionally, IP whitelisting or authentication enforcement on AJAX endpoints can reduce exposure. Monitoring web server logs for unusual or repeated requests to the AJAX handler can help detect attempted exploitation. Organizations should also review user roles assigned by the Directory Kit plugin and minimize the number of users with Directory Kit-specific roles to reduce the volume of exposed emails. Once a patch or update is available from the vendor, it should be applied promptly. Educating users about phishing risks and implementing email filtering solutions can mitigate the impact of any harvested email addresses being used in attacks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13920: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wpdirectorykit WP Directory Kit
Description
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
AI-Powered Analysis
Technical Analysis
CVE-2025-13920 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the WP Directory Kit plugin for WordPress in all versions up to and including 1.4.9. The flaw resides in the wdk_public_action AJAX handler, which improperly exposes email addresses of users assigned Directory Kit-specific roles without requiring any authentication or user interaction. This means that an unauthenticated attacker can send crafted requests to this AJAX endpoint and retrieve sensitive user email information. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. No known exploits have been reported in the wild as of the publication date (January 24, 2026). The vulnerability is significant because email addresses can be leveraged for phishing campaigns, social engineering, or further targeted attacks against organizations using this plugin. The plugin is typically used to manage directories and user roles within WordPress sites, which are common in business, educational, and community websites. The lack of a patch or update at the time of reporting requires organizations to implement interim mitigations to protect sensitive user data.
Potential Impact
For European organizations, the exposure of user email addresses can lead to increased risk of phishing attacks, spear-phishing, and social engineering, potentially compromising user accounts or internal systems if attackers leverage the harvested emails effectively. Organizations relying on WP Directory Kit for managing user directories or role-based access on WordPress sites may face reputational damage and loss of user trust if sensitive information is leaked. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can be a stepping stone for more severe attacks. Given the widespread use of WordPress in Europe, especially in sectors like education, government, and SMEs, the impact could be significant if exploited at scale. The absence of authentication and user interaction requirements lowers the barrier for exploitation, increasing the threat surface. However, the lack of known exploits in the wild suggests limited immediate risk but does not preclude future exploitation.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if WP Directory Kit plugin versions up to 1.4.9 are in use. Until an official patch is released, organizations should restrict access to the wdk_public_action AJAX handler by implementing web application firewall (WAF) rules that block or limit requests to this endpoint from untrusted sources. Additionally, IP whitelisting or authentication enforcement on AJAX endpoints can reduce exposure. Monitoring web server logs for unusual or repeated requests to the AJAX handler can help detect attempted exploitation. Organizations should also review user roles assigned by the Directory Kit plugin and minimize the number of users with Directory Kit-specific roles to reduce the volume of exposed emails. Once a patch or update is available from the vendor, it should be applied promptly. Educating users about phishing risks and implementing email filtering solutions can mitigate the impact of any harvested email addresses being used in attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-02T18:58:08.690Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6974c0304623b1157cb57048
Added to database: 1/24/2026, 12:50:56 PM
Last enriched: 2/1/2026, 8:35:49 AM
Last updated: 2/7/2026, 7:16:02 AM
Views: 52
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.