Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14574: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in wedevs weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot

0
Medium
VulnerabilityCVE-2025-14574cvecve-2025-14574cwe-200
Published: Fri Jan 09 2026 (01/09/2026, 06:34:56 UTC)
Source: CVE Database V5
Vendor/Project: wedevs
Product: weDocs: AI Powered Knowledge Base, Docs, Documentation, Wiki & AI Chatbot

Description

CVE-2025-14574 is a medium severity vulnerability in the weDocs WordPress plugin that allows unauthenticated attackers to access sensitive information via the /wp-json/wp/v2/docs/settings REST API endpoint. This exposure includes third-party service API keys, potentially enabling further attacks or data breaches. The vulnerability affects all versions up to and including 2. 1. 15. Exploitation requires no authentication or user interaction and can be performed remotely over the network. Although no known exploits are currently in the wild, the risk remains significant due to the sensitive nature of the exposed data. European organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue. Countries with high WordPress adoption and active use of this plugin are at greater risk. Mitigation involves restricting access to the vulnerable endpoint, monitoring API key usage, and updating the plugin once a patch is available.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:58:31 UTC

Technical Analysis

CVE-2025-14574 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the weDocs plugin for WordPress, which provides AI-powered knowledge base, documentation, wiki, and chatbot functionalities. The flaw exists in all versions up to and including 2.1.15 and is exploitable via the REST API endpoint /wp-json/wp/v2/docs/settings. This endpoint improperly exposes sensitive configuration data, including API keys for third-party services, without requiring any authentication or user interaction. The vulnerability allows any remote attacker to retrieve these secrets, which could be leveraged to compromise integrated services or escalate attacks. The CVSS v3.1 score is 5.3 (medium severity), reflecting the ease of exploitation (network, no privileges, no user interaction) but limited impact scope (confidentiality only, no integrity or availability impact). No patches or known exploits are currently documented, but the exposure of API keys represents a significant risk for data leakage and potential lateral movement. The vulnerability is particularly relevant for organizations relying on the weDocs plugin for internal or external documentation hosted on WordPress sites.

Potential Impact

For European organizations, the exposure of sensitive API keys can lead to unauthorized access to third-party services, data breaches, and potential lateral movement within corporate networks. This can compromise confidentiality of internal documentation and integrated services, potentially leading to reputational damage, regulatory non-compliance (e.g., GDPR), and financial losses. Organizations using the weDocs plugin on public-facing WordPress sites are at risk of automated scanning and exploitation attempts. The impact is heightened for entities in sectors with strict data protection requirements or those relying heavily on third-party integrations for business operations. Although the vulnerability does not affect integrity or availability directly, the indirect consequences of leaked credentials can be severe, including service disruptions or unauthorized data manipulation via compromised APIs.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the /wp-json/wp/v2/docs/settings REST API endpoint by implementing IP whitelisting or authentication requirements at the web server or application firewall level. Organizations should audit and rotate any exposed third-party API keys to prevent misuse. Monitoring logs for unusual access patterns to the REST API endpoint can help detect exploitation attempts. Until an official patch is released, consider disabling the weDocs plugin if feasible or isolating the WordPress instance hosting it from critical network segments. Regularly update the plugin once a security fix is available and subscribe to vendor advisories for timely notifications. Employing a Web Application Firewall (WAF) with custom rules to block unauthorized REST API requests can provide an additional protective layer.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-12T12:23:59.405Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960a320ecefc3cd7c0b9822

Added to database: 1/9/2026, 6:41:36 AM

Last enriched: 1/16/2026, 9:58:31 AM

Last updated: 2/7/2026, 6:28:05 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats