Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14464: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in kiwicommerce PDF Resume Parser

0
Medium
VulnerabilityCVE-2025-14464cvecve-2025-14464cwe-200
Published: Wed Jan 14 2026 (01/14/2026, 05:28:10 UTC)
Source: CVE Database V5
Vendor/Project: kiwicommerce
Product: PDF Resume Parser

Description

The PDF Resume Parser plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0. This is due to the plugin registering an AJAX action handler that is accessible to unauthenticated users and exposes SMTP configuration data including credentials. This makes it possible for unauthenticated attackers to extract sensitive SMTP credentials (username and password) from the WordPress configuration, which could be leveraged to compromise email accounts and potentially gain unauthorized access to other systems using the same credentials.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:07:44 UTC

Technical Analysis

CVE-2025-14464 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the kiwicommerce PDF Resume Parser plugin for WordPress. The issue arises because the plugin registers an AJAX action handler that is accessible without authentication, allowing any remote attacker to invoke it and retrieve SMTP configuration details stored in the WordPress environment. These details include sensitive credentials such as SMTP usernames and passwords, which are critical for email delivery services. Since SMTP credentials often have broad access, their exposure can lead to unauthorized email sending, interception of communications, or further compromise of systems where the same credentials are reused. The vulnerability affects all versions up to and including 1.0 of the plugin. The CVSS 3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network accessible, no privileges or user interaction required) but limited impact to confidentiality only, with no direct impact on integrity or availability. No patches or fixes are currently listed, and no known exploits have been reported in the wild. The vulnerability's exploitation could facilitate phishing campaigns, spam distribution, or lateral movement within a network if attackers leverage the stolen credentials. The exposure is particularly concerning for organizations relying on WordPress for public-facing sites that use this plugin for resume parsing functionality, as it creates an unintended attack surface.

Potential Impact

For European organizations, the exposure of SMTP credentials can have several serious consequences. Compromised email accounts can lead to unauthorized email sending, including phishing or spear-phishing attacks targeting internal users or external partners, potentially resulting in data breaches or financial fraud. Attackers gaining access to SMTP credentials may also intercept sensitive communications or use the credentials to pivot to other systems if password reuse occurs. This vulnerability undermines the confidentiality of email infrastructure and can damage organizational reputation if exploited. Additionally, organizations subject to GDPR and other data protection regulations may face compliance issues and penalties if sensitive information is leaked due to this vulnerability. The impact is heightened for sectors with critical communications needs such as finance, healthcare, government, and large enterprises. Since the vulnerability requires no authentication and is remotely exploitable, it increases the attack surface for threat actors targeting European entities using this plugin. The lack of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

European organizations should take the following specific steps to mitigate this vulnerability: 1) Immediately audit WordPress installations to identify the presence of the kiwicommerce PDF Resume Parser plugin and confirm affected versions. 2) If possible, disable or remove the plugin until a patch or update is available. 3) Restrict access to the AJAX action handler by implementing authentication checks or IP whitelisting at the web server or application firewall level to prevent unauthenticated access. 4) Rotate all SMTP credentials exposed by the plugin to invalidate any potentially compromised credentials. 5) Monitor email logs and network traffic for unusual activity indicative of credential misuse or unauthorized email sending. 6) Implement multi-factor authentication (MFA) on email accounts where supported to reduce the impact of credential exposure. 7) Keep WordPress core and all plugins updated regularly and subscribe to vulnerability advisories for timely patching. 8) Consider deploying web application firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting this AJAX endpoint. 9) Educate IT and security teams about this vulnerability to ensure rapid response if exploitation attempts are detected. These measures go beyond generic advice by focusing on access control to the vulnerable endpoint, credential hygiene, and active monitoring tailored to this specific exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T16:02:23.485Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fce

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 1/14/2026, 6:07:44 AM

Last updated: 1/14/2026, 4:42:02 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats