Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58246: CWE-201 Insertion of Sensitive Information Into Sent Data in Automattic WordPress

0
Medium
VulnerabilityCVE-2025-58246cvecve-2025-58246cwe-201
Published: Tue Sep 23 2025 (09/23/2025, 17:17:12 UTC)
Source: CVE Database V5
Vendor/Project: Automattic
Product: WordPress

Description

Insertion of Sensitive Information Into Sent Data vulnerability in Automattic WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.

AI-Powered Analysis

AILast updated: 09/23/2025, 17:32:55 UTC

Technical Analysis

CVE-2025-58246 is a vulnerability classified under CWE-201, which involves the insertion of sensitive information into sent data within Automattic's WordPress platform. This vulnerability allows an attacker with contributor-level privileges to retrieve embedded sensitive data that should not be exposed. The issue affects WordPress versions up to 6.8.2, with no specific lower bound version mentioned. The vulnerability does not require user interaction and can be exploited remotely (AV:N), with low attack complexity (AC:L). However, it requires the attacker to have contributor-level privileges (PR:L), which means some level of authenticated access is necessary. The vulnerability impacts confidentiality (C:L) but does not affect integrity or availability. The WordPress Core security team is aware and working on a fix, but no patch links are currently available. There are no known exploits in the wild at this time. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vulnerability could allow an attacker to extract sensitive information embedded in data sent by the WordPress system, potentially exposing user data or internal configuration details that could be leveraged for further attacks or privacy violations. Given WordPress's widespread use as a content management system, the vulnerability could affect a large number of websites, especially those that allow contributor-level access to untrusted users.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive information, which may include user data, internal site configurations, or other confidential content embedded in sent data. This could result in privacy breaches, non-compliance with GDPR and other data protection regulations, and reputational damage. Organizations relying on WordPress for their public-facing websites or intranet portals that permit contributor-level access are particularly at risk. Although the vulnerability does not directly affect data integrity or availability, the confidentiality breach could be exploited as a stepping stone for more advanced attacks, such as privilege escalation or targeted phishing campaigns. The medium severity rating reflects that while the impact is limited to confidentiality and requires authenticated access, the widespread use of WordPress in Europe increases the potential attack surface. Additionally, the lack of known exploits in the wild currently reduces immediate risk, but organizations should not delay remediation given the potential for future exploitation.

Mitigation Recommendations

European organizations should implement the following specific mitigation measures: 1) Restrict contributor-level privileges strictly to trusted users and regularly audit user roles and permissions to minimize the number of accounts with such access. 2) Monitor WordPress core updates closely and apply security patches promptly once the fix for CVE-2025-58246 is released. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious activities from contributor accounts that attempt to access or extract sensitive embedded data. 4) Conduct regular security assessments and penetration tests focusing on privilege escalation and data leakage scenarios within WordPress environments. 5) Implement logging and alerting on sensitive data access patterns to detect potential exploitation attempts early. 6) Educate content contributors about security best practices and the importance of safeguarding their credentials to prevent unauthorized access. 7) Consider deploying additional data encryption or tokenization mechanisms for sensitive data embedded in sent content to reduce exposure risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-08-27T16:19:44.959Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d2d9b550473c5b345e2613

Added to database: 9/23/2025, 5:32:37 PM

Last enriched: 9/23/2025, 5:32:55 PM

Last updated: 10/7/2025, 1:52:02 PM

Views: 62

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats