Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14464: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in kiwicommerce PDF Resume Parser

0
Medium
VulnerabilityCVE-2025-14464cvecve-2025-14464cwe-200
Published: Wed Jan 14 2026 (01/14/2026, 05:28:10 UTC)
Source: CVE Database V5
Vendor/Project: kiwicommerce
Product: PDF Resume Parser

Description

CVE-2025-14464 is a medium-severity vulnerability in the kiwicommerce PDF Resume Parser WordPress plugin that allows unauthenticated attackers to access sensitive SMTP credentials via an exposed AJAX action handler. This flaw affects all versions up to 1. 0 and can lead to unauthorized disclosure of email server usernames and passwords. Exploiting this vulnerability does not require authentication or user interaction, making it relatively easy to abuse. The exposed credentials could be used to compromise email accounts and potentially pivot to other systems using the same credentials. Although no known exploits are currently reported in the wild, organizations using this plugin should prioritize patching or mitigation. European organizations relying on WordPress sites with this plugin are at risk, especially those with critical email infrastructure tied to the exposed SMTP credentials. Mitigation involves restricting access to AJAX handlers, removing sensitive data exposure, and rotating SMTP credentials. Countries with high WordPress adoption and significant e-commerce or recruitment sectors, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:43:17 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14464 affects the kiwicommerce PDF Resume Parser plugin for WordPress, specifically all versions up to and including 1.0. The root cause is the plugin's registration of an AJAX action handler that is accessible without authentication, which inadvertently exposes SMTP configuration data, including usernames and passwords. This exposure constitutes a CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) vulnerability. Because the AJAX endpoint is publicly accessible, an attacker can send crafted requests to retrieve SMTP credentials stored in the WordPress configuration. These credentials are critical as they enable access to email accounts, which are often gateways to broader network access or sensitive communications. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting medium severity, primarily due to the lack of impact on integrity or availability but significant confidentiality loss. Exploitation requires no privileges or user interaction, increasing the risk. No patches or updates are currently listed, and no known exploits have been observed in the wild. However, the potential for credential theft and subsequent lateral movement or phishing attacks makes this a notable threat. The vulnerability highlights the importance of secure plugin development practices, including proper access control on AJAX handlers and safeguarding sensitive configuration data.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of SMTP credentials, which can lead to email account compromise. Email accounts often serve as critical communication channels and recovery mechanisms for other services; thus, their compromise can cascade into broader security incidents, including data breaches, business email compromise (BEC), and unauthorized access to internal systems. Organizations using the affected plugin on WordPress sites that handle recruitment, HR, or e-commerce functions may face reputational damage and operational disruption if attackers leverage stolen credentials. The medium CVSS score reflects limited direct impact on system integrity or availability but significant confidentiality concerns. The ease of exploitation (no authentication or user interaction needed) increases the likelihood of automated scanning and exploitation attempts, especially in environments with exposed WordPress installations. European entities with strict data protection regulations (e.g., GDPR) may also face compliance risks if sensitive personal data is indirectly exposed through compromised email accounts.

Mitigation Recommendations

1. Immediately restrict access to the vulnerable AJAX action handler by implementing authentication checks or IP whitelisting to prevent unauthenticated access. 2. Remove or sanitize any code that exposes SMTP credentials or other sensitive configuration data via publicly accessible endpoints. 3. Rotate all SMTP credentials that may have been exposed to prevent unauthorized access using compromised credentials. 4. Monitor email accounts for suspicious activity, including unauthorized login attempts or unusual email sending patterns. 5. Apply the latest plugin updates once available from the vendor or consider disabling the PDF Resume Parser plugin until a secure version is released. 6. Conduct a thorough audit of all WordPress plugins and configurations to identify and remediate similar exposure risks. 7. Employ web application firewalls (WAFs) to detect and block suspicious AJAX requests targeting the vulnerable endpoint. 8. Educate administrators on the risks of exposing sensitive configuration data and enforce secure coding practices for plugin development.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T16:02:23.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fce

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 1/21/2026, 8:43:17 PM

Last updated: 2/7/2026, 12:05:40 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats