Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2841: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in reality66 Cart66 Cloud :: WordPress Ecommerce The Easy Way

0
Medium
VulnerabilityCVE-2025-2841cvecve-2025-2841cwe-200
Published: Sat Apr 12 2025 (04/12/2025, 02:23:14 UTC)
Source: CVE Database V5
Vendor/Project: reality66
Product: Cart66 Cloud :: WordPress Ecommerce The Easy Way

Description

CVE-2025-2841 is a medium-severity vulnerability affecting all versions of the Cart66 Cloud WordPress ecommerce plugin up to 2. 3. 7. It allows unauthenticated attackers to access a publicly exposed phpinfo. php script, which can leak sensitive server and environment information. This exposure can aid attackers in reconnaissance activities, potentially facilitating further attacks. The vulnerability does not allow direct code execution or data modification but compromises confidentiality. Exploitation requires no authentication or user interaction and can be performed remotely. No known exploits are currently reported in the wild. Organizations using Cart66 Cloud should prioritize restricting access to the phpinfo.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:28:28 UTC

Technical Analysis

CVE-2025-2841 is a vulnerability categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) found in the Cart66 Cloud plugin for WordPress, a popular ecommerce solution branded as 'The Easy Way'. The flaw exists in all versions up to and including 2.3.7 and stems from the presence of a publicly accessible phpinfo.php script. This script, when accessed by unauthenticated attackers, reveals detailed PHP environment information such as server configuration, loaded modules, environment variables, and potentially sensitive paths or credentials if misconfigured. Such information disclosure can significantly aid attackers in crafting targeted attacks, including privilege escalation or further exploitation of other vulnerabilities. The vulnerability is remotely exploitable without any authentication or user interaction, increasing its risk profile. The CVSS v3.1 base score is 5.3, reflecting a medium severity due to the confidentiality impact without affecting integrity or availability. No patches are currently linked, and no known exploits have been reported in the wild, but the exposure of phpinfo.php is a well-known risk vector in web applications. The vulnerability affects the plugin's default deployment where this script is not properly secured or removed.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive server and environment information. While it does not directly compromise data integrity or availability, the leaked information can facilitate more sophisticated attacks such as privilege escalation, remote code execution, or targeted phishing by revealing server software versions, installed modules, and configuration details. Organizations running ecommerce sites using Cart66 Cloud are at risk of having their backend environment details exposed, potentially leading to further exploitation. This can undermine customer trust and lead to data breaches if combined with other vulnerabilities. The impact is particularly significant for organizations lacking robust perimeter defenses or those that do not regularly audit exposed files. Since the vulnerability requires no authentication and no user interaction, it can be exploited by automated scanning tools, increasing the likelihood of reconnaissance by malicious actors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the phpinfo.php script by removing it entirely or limiting access via web server configuration (e.g., IP whitelisting or authentication). If removal is not possible, configuring the web server to deny public access to this file is critical. Administrators should audit their webroot for any unintended exposure of diagnostic or configuration files. Monitoring web server logs for access attempts to phpinfo.php can help detect exploitation attempts. It is also advisable to update the Cart66 Cloud plugin as soon as an official patch or update addressing this vulnerability is released. Employing a Web Application Firewall (WAF) with rules to block access to sensitive files can provide an additional layer of defense. Regular security assessments and vulnerability scans should be conducted to identify similar exposures. Finally, organizations should ensure that sensitive information is not stored in environment variables or configurations accessible via such scripts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-27T00:08:19.935Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b26b7ef31ef0b54eb01

Added to database: 2/25/2026, 9:35:34 PM

Last enriched: 2/25/2026, 10:28:28 PM

Last updated: 2/26/2026, 8:07:25 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats