CVE-2025-14464: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in kiwicommerce PDF Resume Parser
The PDF Resume Parser plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0. This is due to the plugin registering an AJAX action handler that is accessible to unauthenticated users and exposes SMTP configuration data including credentials. This makes it possible for unauthenticated attackers to extract sensitive SMTP credentials (username and password) from the WordPress configuration, which could be leveraged to compromise email accounts and potentially gain unauthorized access to other systems using the same credentials.
AI Analysis
Technical Summary
CVE-2025-14464 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the kiwicommerce PDF Resume Parser plugin for WordPress. The issue arises because the plugin registers an AJAX action handler that is accessible without authentication, allowing any remote attacker to invoke it and retrieve SMTP configuration details stored in the WordPress environment. These details include sensitive credentials such as SMTP usernames and passwords, which are critical for email delivery services. Since SMTP credentials often have broad access, their exposure can lead to unauthorized email sending, interception of communications, or further compromise of systems where the same credentials are reused. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) but limited impact to confidentiality only, with no direct impact on integrity or availability. No patches or fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability's exploitation could facilitate phishing campaigns, spam distribution, or lateral movement within a network if attackers leverage the stolen credentials. The exposure is particularly concerning for organizations relying on WordPress for public-facing sites that use this plugin for resume parsing functionality, as it creates an unintended attack surface.
Potential Impact
For European organizations, the exposure of SMTP credentials can have several serious consequences. Compromised email accounts can lead to unauthorized email sending, including phishing or spear-phishing attacks targeting internal users or external partners, potentially resulting in data breaches or financial fraud. Attackers gaining access to SMTP credentials may also intercept sensitive communications or use the credentials to pivot to other systems if password reuse occurs. This vulnerability undermines the confidentiality of email infrastructure and can damage organizational reputation if exploited. Additionally, organizations subject to GDPR and other data protection regulations may face compliance issues and penalties if sensitive information is leaked due to this vulnerability. The impact is heightened for sectors with critical communications needs such as finance, healthcare, government, and large enterprises. Since the vulnerability requires no authentication and is remotely exploitable, it increases the attack surface for threat actors targeting European entities using this plugin. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit WordPress installations to identify the presence of the kiwicommerce PDF Resume Parser plugin and confirm affected versions. 2) If possible, disable or remove the plugin until a patch or update is available. 3) Restrict access to the AJAX action handler by implementing authentication checks or IP whitelisting at the web server or application firewall level to prevent unauthenticated access. 4) Rotate all SMTP credentials exposed by the plugin to invalidate any potentially compromised credentials. 5) Monitor email logs and network traffic for unusual activity indicative of credential misuse or unauthorized email sending. 6) Implement multi-factor authentication (MFA) on email accounts where supported to reduce the impact of credential exposure. 7) Keep WordPress core and all plugins updated regularly and subscribe to vulnerability advisories for timely patching. 8) Consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this AJAX endpoint. 9) Educate IT and security teams about this vulnerability to ensure rapid response if exploitation attempts are detected. These measures go beyond generic advice by focusing on access control to the vulnerable endpoint, credential hygiene, and active monitoring tailored to this specific exposure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14464: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in kiwicommerce PDF Resume Parser
Description
The PDF Resume Parser plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0. This is due to the plugin registering an AJAX action handler that is accessible to unauthenticated users and exposes SMTP configuration data including credentials. This makes it possible for unauthenticated attackers to extract sensitive SMTP credentials (username and password) from the WordPress configuration, which could be leveraged to compromise email accounts and potentially gain unauthorized access to other systems using the same credentials.
AI-Powered Analysis
Technical Analysis
CVE-2025-14464 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the kiwicommerce PDF Resume Parser plugin for WordPress. The issue arises because the plugin registers an AJAX action handler that is accessible without authentication, allowing any remote attacker to invoke it and retrieve SMTP configuration details stored in the WordPress environment. These details include sensitive credentials such as SMTP usernames and passwords, which are critical for email delivery services. Since SMTP credentials often have broad access, their exposure can lead to unauthorized email sending, interception of communications, or further compromise of systems where the same credentials are reused. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) but limited impact to confidentiality only, with no direct impact on integrity or availability. No patches or fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability's exploitation could facilitate phishing campaigns, spam distribution, or lateral movement within a network if attackers leverage the stolen credentials. The exposure is particularly concerning for organizations relying on WordPress for public-facing sites that use this plugin for resume parsing functionality, as it creates an unintended attack surface.
Potential Impact
For European organizations, the exposure of SMTP credentials can have several serious consequences. Compromised email accounts can lead to unauthorized email sending, including phishing or spear-phishing attacks targeting internal users or external partners, potentially resulting in data breaches or financial fraud. Attackers gaining access to SMTP credentials may also intercept sensitive communications or use the credentials to pivot to other systems if password reuse occurs. This vulnerability undermines the confidentiality of email infrastructure and can damage organizational reputation if exploited. Additionally, organizations subject to GDPR and other data protection regulations may face compliance issues and penalties if sensitive information is leaked due to this vulnerability. The impact is heightened for sectors with critical communications needs such as finance, healthcare, government, and large enterprises. Since the vulnerability requires no authentication and is remotely exploitable, it increases the attack surface for threat actors targeting European entities using this plugin. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit WordPress installations to identify the presence of the kiwicommerce PDF Resume Parser plugin and confirm affected versions. 2) If possible, disable or remove the plugin until a patch or update is available. 3) Restrict access to the AJAX action handler by implementing authentication checks or IP whitelisting at the web server or application firewall level to prevent unauthenticated access. 4) Rotate all SMTP credentials exposed by the plugin to invalidate any potentially compromised credentials. 5) Monitor email logs and network traffic for unusual activity indicative of credential misuse or unauthorized email sending. 6) Implement multi-factor authentication (MFA) on email accounts where supported to reduce the impact of credential exposure. 7) Keep WordPress core and all plugins updated regularly and subscribe to vulnerability advisories for timely patching. 8) Consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this AJAX endpoint. 9) Educate IT and security teams about this vulnerability to ensure rapid response if exploitation attempts are detected. These measures go beyond generic advice by focusing on access control to the vulnerable endpoint, credential hygiene, and active monitoring tailored to this specific exposure.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T16:02:23.485Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69672e008330e067168f3fce
Added to database: 1/14/2026, 5:47:44 AM
Last enriched: 1/14/2026, 6:07:44 AM
Last updated: 1/14/2026, 4:42:02 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-37185: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator
MediumCVE-2025-37184: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator
MediumCVE-2025-37183: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator
HighCVE-2025-37182: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator
HighCVE-2025-37181: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.