Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4593: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in avimegladon WP Register Profile With Shortcode

0
Medium
VulnerabilityCVE-2025-4593cvecve-2025-4593cwe-200
Published: Fri Jul 11 2025 (07/11/2025, 07:22:59 UTC)
Source: CVE Database V5
Vendor/Project: avimegladon
Product: WP Register Profile With Shortcode

Description

The WP Register Profile With Shortcode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.2 via the 'rp_user_data' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data from user meta like hashed passwords, usernames, and more.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 14:41:00 UTC

Technical Analysis

CVE-2025-4593 is a vulnerability identified in the WP Register Profile With Shortcode plugin for WordPress, affecting all versions up to and including 3.6.2. The flaw resides in the 'rp_user_data' shortcode functionality, which improperly exposes sensitive user meta information to authenticated users with Contributor-level privileges or higher. Exploitation involves invoking this shortcode to retrieve sensitive data such as hashed passwords, usernames, and potentially other private user metadata. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor). The attack vector is network-based and does not require user interaction, but it does require the attacker to have at least Contributor-level access, which is a relatively low privilege level in WordPress. The CVSS 3.1 base score is 6.5, indicating a medium severity, with a vector string AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N, meaning the attack is remotely exploitable with low complexity, requires privileges, no user interaction, and results in high confidentiality impact without affecting integrity or availability. No patches or exploits are currently publicly available, but the vulnerability poses a significant risk to the confidentiality of user data on affected WordPress sites.

Potential Impact

The primary impact of CVE-2025-4593 is the unauthorized disclosure of sensitive user information, including hashed passwords and usernames, which can facilitate further attacks such as credential stuffing, phishing, or privilege escalation. Organizations running WordPress sites with this plugin are at risk of data breaches that compromise user privacy and trust. Although the vulnerability requires authenticated access at Contributor level or above, many WordPress sites allow user registrations or have multiple contributors, increasing the attack surface. The exposure of hashed passwords, even if salted, can lead to offline cracking attempts, potentially revealing plaintext passwords. This can cascade into broader organizational risks if users reuse passwords across services. The vulnerability does not affect system integrity or availability, but the confidentiality breach alone can have legal, reputational, and operational consequences. The threat is global, affecting any organization using the vulnerable plugin, with particular concern for sites with large user bases or sensitive user data.

Mitigation Recommendations

To mitigate CVE-2025-4593, organizations should immediately upgrade the WP Register Profile With Shortcode plugin to a patched version once available. In the absence of an official patch, administrators should disable or remove the 'rp_user_data' shortcode functionality to prevent exploitation. Restrict Contributor-level and higher privileges strictly to trusted users and review user roles to minimize unnecessary elevated access. Implement monitoring and logging for shortcode usage and unusual access patterns to detect potential exploitation attempts. Additionally, enforce strong password policies and consider multi-factor authentication to reduce the risk from compromised credentials. Regularly audit user meta data exposure and sanitize or limit sensitive information stored in user meta fields. Finally, maintain up-to-date backups and incident response plans to address potential data breaches stemming from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-05-12T15:32:43.438Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6870bdbba83201eaacacf6f2

Added to database: 7/11/2025, 7:31:07 AM

Last enriched: 2/27/2026, 2:41:00 PM

Last updated: 3/24/2026, 7:04:45 AM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses