Skip to main content

CVE-2025-60167: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in honzat Page Manager for Elementor

Medium
VulnerabilityCVE-2025-60167cvecve-2025-60167cwe-497
Published: Fri Sep 26 2025 (09/26/2025, 08:32:04 UTC)
Source: CVE Database V5
Vendor/Project: honzat
Product: Page Manager for Elementor

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in honzat Page Manager for Elementor allows Retrieve Embedded Sensitive Data. This issue affects Page Manager for Elementor: from n/a through 2.0.5.

AI-Powered Analysis

AILast updated: 09/26/2025, 16:10:56 UTC

Technical Analysis

CVE-2025-60167 is a vulnerability classified under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. This specific vulnerability affects the 'Page Manager for Elementor' plugin developed by honzat, versions up to and including 2.0.5. The flaw allows an attacker with some level of privileges (PR:L indicates that low privileges are required) but no user interaction (UI:N) to remotely retrieve embedded sensitive data from the system. The vulnerability is exploitable over the network (AV:N) with low attack complexity (AC:L), meaning it does not require sophisticated conditions to exploit. The scope of the vulnerability is unchanged (S:U), indicating that the impact is limited to the vulnerable component without affecting other components or systems. The confidentiality impact is low (C:L), with no impact on integrity (I:N) or availability (A:N). This suggests that while sensitive information can be leaked, the attacker cannot modify data or disrupt service. No known exploits are currently reported in the wild, and no patches have been linked yet, implying that remediation may still be pending or in development. The vulnerability is significant because the exposed sensitive information could potentially be used to facilitate further attacks or reconnaissance against the affected system. Given that Elementor is a widely used WordPress page builder plugin, and 'Page Manager for Elementor' is an add-on, this vulnerability could affect many websites using this combination if they have not updated or mitigated the issue.

Potential Impact

For European organizations, the exposure of sensitive system information can lead to increased risk of targeted attacks, including phishing, privilege escalation, or lateral movement within networks. Organizations relying on WordPress sites with Elementor and the affected Page Manager plugin could face data leakage that compromises internal configurations or credentials embedded within the plugin's data. This could undermine confidentiality and potentially lead to compliance violations under GDPR if personal data or system credentials are exposed. Although the vulnerability does not directly affect integrity or availability, the leaked information could be leveraged by attackers to craft more effective attacks, increasing the overall risk posture. European businesses in sectors with high web presence, such as e-commerce, media, and public services, may be particularly vulnerable if they use this plugin. The medium severity rating indicates that while the immediate damage may be limited, the potential for exploitation and subsequent attacks warrants attention.

Mitigation Recommendations

1. Immediate action should include auditing all WordPress sites for the presence of the 'Page Manager for Elementor' plugin and identifying versions up to 2.0.5. 2. Apply any available patches or updates from the vendor as soon as they are released. Since no patch links are currently available, monitor vendor advisories and security mailing lists closely. 3. Restrict access to the WordPress admin interface and plugin management pages to trusted IP addresses or VPN users to reduce the risk of unauthorized access. 4. Implement strict role-based access controls (RBAC) within WordPress to ensure that only necessary users have privileges that could be leveraged to exploit this vulnerability. 5. Conduct regular security scans and penetration tests focusing on information disclosure vulnerabilities. 6. Review and sanitize any embedded sensitive data within the plugin's configuration or content to minimize the amount of sensitive information stored. 7. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting this vulnerability. 8. Educate site administrators about the risks of outdated plugins and the importance of timely updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:28:09.603Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d6bb0017bcb728eab31561

Added to database: 9/26/2025, 4:10:40 PM

Last enriched: 9/26/2025, 4:10:56 PM

Last updated: 9/27/2025, 12:57:20 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats