Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14574: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wedevs weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot

0
Medium
VulnerabilityCVE-2025-14574cvecve-2025-14574cwe-200
Published: Fri Jan 09 2026 (01/09/2026, 06:34:56 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot

Description

The weDocs plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.15 via the `/wp-json/wp/v2/docs/settings` REST API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including third party services API keys.

AI-Powered Analysis

AILast updated: 01/09/2026, 06:58:27 UTC

Technical Analysis

CVE-2025-14574 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the weDocs plugin for WordPress, a tool designed to provide AI-powered knowledge bases, documentation, wikis, and chatbots. The flaw exists in all versions up to and including 2.1.15 and is exploitable via the REST API endpoint /wp-json/wp/v2/docs/settings. This endpoint improperly exposes sensitive configuration data, including API keys for third-party services, without requiring any form of authentication or user interaction. The vulnerability arises due to insufficient access controls on the REST API, allowing any unauthenticated attacker to retrieve sensitive settings data. The CVSS v3.1 base score is 5.3, reflecting a medium severity primarily due to the confidentiality impact without affecting integrity or availability. The vulnerability was publicly disclosed in early 2026, with no known active exploits reported yet. The exposure of API keys can enable attackers to leverage third-party integrations maliciously, potentially leading to further compromise or data leakage. The plugin is widely used in WordPress environments, which are prevalent across many organizational websites, making this a notable risk vector. The lack of patches at the time of disclosure necessitates immediate mitigation efforts to prevent exploitation.

Potential Impact

For European organizations, the exposure of sensitive information such as third-party API keys can have significant repercussions. Attackers gaining access to these keys might abuse integrated services, leading to unauthorized data access, service disruptions, or financial fraud. Organizations relying on weDocs for internal or customer-facing documentation risk leakage of confidential operational details. This can undermine trust, violate data protection regulations like GDPR, and potentially result in regulatory penalties. The medium severity rating indicates that while the vulnerability does not directly compromise system integrity or availability, the confidentiality breach can serve as a stepping stone for more sophisticated attacks. Given the widespread use of WordPress and the popularity of documentation plugins, many SMEs and larger enterprises across Europe could be targeted. The impact is heightened in sectors with stringent compliance requirements or those heavily dependent on third-party cloud services integrated via API keys.

Mitigation Recommendations

1. Immediately restrict access to the /wp-json/wp/v2/docs/settings REST API endpoint by implementing authentication and authorization checks, such as requiring logged-in users with appropriate roles. 2. If possible, disable the REST API endpoint temporarily until an official patch is released. 3. Monitor web server logs for unusual or repeated access attempts to the vulnerable endpoint to detect potential exploitation attempts. 4. Rotate any third-party API keys that may have been exposed to invalidate compromised credentials. 5. Apply the official patch or update the weDocs plugin to a secure version as soon as it becomes available. 6. Employ Web Application Firewalls (WAFs) with rules to block unauthenticated access to sensitive REST API endpoints. 7. Conduct a security audit of all WordPress plugins to identify similar exposure risks and ensure minimal plugin usage. 8. Educate site administrators on the risks of exposing sensitive configuration data and enforce the principle of least privilege for plugin settings.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T12:23:59.405Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960a320ecefc3cd7c0b9822

Added to database: 1/9/2026, 6:41:36 AM

Last enriched: 1/9/2026, 6:58:27 AM

Last updated: 1/10/2026, 10:16:01 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats