CVE-2025-14574: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wedevs weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot
The weDocs plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.15 via the `/wp-json/wp/v2/docs/settings` REST API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including third party services API keys.
AI Analysis
Technical Summary
CVE-2025-14574 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the weDocs plugin for WordPress, a tool designed to provide AI-powered knowledge bases, documentation, wikis, and chatbots. The flaw exists in all versions up to and including 2.1.15 and is exploitable via the REST API endpoint /wp-json/wp/v2/docs/settings. This endpoint improperly exposes sensitive configuration data, including API keys for third-party services, without requiring any form of authentication or user interaction. The vulnerability arises due to insufficient access controls on the REST API, allowing any unauthenticated attacker to retrieve sensitive settings data. The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the confidentiality impact without affecting integrity or availability. The vulnerability was publicly disclosed in early 2026, with no known active exploits reported yet. The exposure of API keys can enable attackers to leverage third-party integrations maliciously, potentially leading to further compromise or data leakage. The plugin is widely used in WordPress environments, which are prevalent across many organizational websites, making this a notable risk vector. The lack of patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.
Potential Impact
For European organizations, the exposure of sensitive information such as third-party API keys can have significant repercussions. Attackers gaining access to these keys might abuse integrated services, leading to unauthorized data access, service disruptions, or financial fraud. Organizations relying on weDocs for internal or customer-facing documentation risk leakage of confidential operational details. This can undermine trust, violate data protection regulations like GDPR, and potentially result in regulatory penalties. The medium severity rating indicates that while the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can serve as a stepping stone for more sophisticated attacks. Given the widespread use of WordPress and the popularity of documentation plugins, many SMEs and larger enterprises across Europe could be targeted. The impact is heightened in sectors with stringent compliance requirements or those heavily dependent on third-party cloud services integrated via API keys.
Mitigation Recommendations
1. Immediately restrict access to the /wp-json/wp/v2/docs/settings REST API endpoint by implementing authentication and authorization checks, such as requiring logged-in users with appropriate roles. 2. If possible, disable the REST API endpoint temporarily until an official patch is released. 3. Monitor web server logs for unusual or repeated access attempts to the vulnerable endpoint to detect potential exploitation attempts. 4. Rotate any third-party API keys that may have been exposed to invalidate compromised credentials. 5. Apply the official patch or update the weDocs plugin to a secure version as soon as it becomes available. 6. Employ Web Application Firewalls (WAFs) with rules to block unauthenticated access to sensitive REST API endpoints. 7. Conduct a security audit of all WordPress plugins to identify similar exposure risks and ensure minimal plugin usage. 8. Educate site administrators on the risks of exposing sensitive configuration data and enforce the principle of least privilege for plugin settings.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14574: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wedevs weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot
Description
The weDocs plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.15 via the `/wp-json/wp/v2/docs/settings` REST API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including third party services API keys.
AI-Powered Analysis
Technical Analysis
CVE-2025-14574 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the weDocs plugin for WordPress, a tool designed to provide AI-powered knowledge bases, documentation, wikis, and chatbots. The flaw exists in all versions up to and including 2.1.15 and is exploitable via the REST API endpoint /wp-json/wp/v2/docs/settings. This endpoint improperly exposes sensitive configuration data, including API keys for third-party services, without requiring any form of authentication or user interaction. The vulnerability arises due to insufficient access controls on the REST API, allowing any unauthenticated attacker to retrieve sensitive settings data. The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the confidentiality impact without affecting integrity or availability. The vulnerability was publicly disclosed in early 2026, with no known active exploits reported yet. The exposure of API keys can enable attackers to leverage third-party integrations maliciously, potentially leading to further compromise or data leakage. The plugin is widely used in WordPress environments, which are prevalent across many organizational websites, making this a notable risk vector. The lack of patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.
Potential Impact
For European organizations, the exposure of sensitive information such as third-party API keys can have significant repercussions. Attackers gaining access to these keys might abuse integrated services, leading to unauthorized data access, service disruptions, or financial fraud. Organizations relying on weDocs for internal or customer-facing documentation risk leakage of confidential operational details. This can undermine trust, violate data protection regulations like GDPR, and potentially result in regulatory penalties. The medium severity rating indicates that while the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can serve as a stepping stone for more sophisticated attacks. Given the widespread use of WordPress and the popularity of documentation plugins, many SMEs and larger enterprises across Europe could be targeted. The impact is heightened in sectors with stringent compliance requirements or those heavily dependent on third-party cloud services integrated via API keys.
Mitigation Recommendations
1. Immediately restrict access to the /wp-json/wp/v2/docs/settings REST API endpoint by implementing authentication and authorization checks, such as requiring logged-in users with appropriate roles. 2. If possible, disable the REST API endpoint temporarily until an official patch is released. 3. Monitor web server logs for unusual or repeated access attempts to the vulnerable endpoint to detect potential exploitation attempts. 4. Rotate any third-party API keys that may have been exposed to invalidate compromised credentials. 5. Apply the official patch or update the weDocs plugin to a secure version as soon as it becomes available. 6. Employ Web Application Firewalls (WAFs) with rules to block unauthenticated access to sensitive REST API endpoints. 7. Conduct a security audit of all WordPress plugins to identify similar exposure risks and ensure minimal plugin usage. 8. Educate site administrators on the risks of exposing sensitive configuration data and enforce the principle of least privilege for plugin settings.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-12T12:23:59.405Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6960a320ecefc3cd7c0b9822
Added to database: 1/9/2026, 6:41:36 AM
Last enriched: 1/9/2026, 6:58:27 AM
Last updated: 1/10/2026, 10:16:01 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.