CVE-2025-64272: Exposure of Sensitive System Information to an Unauthorized Control Sphere in GetResponse Email marketing for WordPress by GetResponse Official
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in GetResponse Email marketing for WordPress by GetResponse Official getresponse-official allows Retrieve Embedded Sensitive Data.This issue affects Email marketing for WordPress by GetResponse Official: from n/a through <= 1.5.3.
AI Analysis
Technical Summary
CVE-2025-64272 is a vulnerability identified in the GetResponse Email marketing plugin for WordPress, specifically affecting versions up to and including 1.5.3. The vulnerability allows an attacker who has low-level privileges (PR:L) to remotely retrieve embedded sensitive system information without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur remotely over the internet. The vulnerability does not impact the integrity or availability of the system but has a high impact on confidentiality (C:H). This means that sensitive data embedded within the plugin or its configuration can be exposed to unauthorized actors within the control sphere of the system. The vulnerability arises from improper access controls or insufficient sanitization of sensitive data retrieval functions within the plugin. Although no known exploits are currently reported in the wild, the medium CVSS score of 6.5 reflects the significant risk posed by unauthorized information disclosure, which could facilitate further targeted attacks or data breaches. The plugin is widely used for email marketing integration in WordPress sites, making it a valuable target for attackers seeking to gather intelligence on system configurations or user data. The vulnerability was reserved in late October 2025 and published in December 2025, indicating recent discovery and disclosure. No official patches or updates are currently linked, so users must rely on interim mitigations until a fix is released.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive system information could be exposed to unauthorized parties. This could include configuration details, API keys, or other embedded data that attackers might leverage to escalate privileges or conduct further attacks such as phishing or targeted intrusions. Organizations heavily reliant on WordPress for their digital presence and using the GetResponse plugin for email marketing are at increased risk. The exposure of sensitive data could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and potential financial losses. Since the vulnerability requires some level of authentication but no user interaction, insider threats or compromised low-privilege accounts could exploit this flaw remotely. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. European companies with extensive marketing operations or handling sensitive customer data should consider this vulnerability a priority for risk management.
Mitigation Recommendations
1. Immediately audit and restrict access to the GetResponse Email marketing plugin within WordPress, limiting it to trusted administrators only. 2. Monitor logs and network traffic for unusual access patterns or attempts to retrieve sensitive data from the plugin endpoints. 3. Disable or uninstall the plugin temporarily if it is not critical to operations until an official patch is released. 4. Implement strict role-based access controls (RBAC) within WordPress to minimize the number of users with privileges sufficient to exploit this vulnerability. 5. Use web application firewalls (WAFs) to detect and block suspicious requests targeting the plugin’s known endpoints. 6. Stay informed about updates from GetResponse and apply security patches promptly once available. 7. Conduct internal security awareness training to reduce the risk of credential compromise that could facilitate exploitation. 8. Consider isolating marketing-related WordPress instances from critical internal networks to contain potential breaches.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-64272: Exposure of Sensitive System Information to an Unauthorized Control Sphere in GetResponse Email marketing for WordPress by GetResponse Official
Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in GetResponse Email marketing for WordPress by GetResponse Official getresponse-official allows Retrieve Embedded Sensitive Data.This issue affects Email marketing for WordPress by GetResponse Official: from n/a through <= 1.5.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-64272 is a vulnerability identified in the GetResponse Email marketing plugin for WordPress, specifically affecting versions up to and including 1.5.3. The vulnerability allows an attacker who has low-level privileges (PR:L) to remotely retrieve embedded sensitive system information without requiring user interaction (UI:N). The attack vector is network-based (AV:N), meaning exploitation can occur remotely over the internet. The vulnerability does not impact the integrity or availability of the system but has a high impact on confidentiality (C:H). This means that sensitive data embedded within the plugin or its configuration can be exposed to unauthorized actors within the control sphere of the system. The vulnerability arises from improper access controls or insufficient sanitization of sensitive data retrieval functions within the plugin. Although no known exploits are currently reported in the wild, the medium CVSS score of 6.5 reflects the significant risk posed by unauthorized information disclosure, which could facilitate further targeted attacks or data breaches. The plugin is widely used for email marketing integration in WordPress sites, making it a valuable target for attackers seeking to gather intelligence on system configurations or user data. The vulnerability was reserved in late October 2025 and published in December 2025, indicating recent discovery and disclosure. No official patches or updates are currently linked, so users must rely on interim mitigations until a fix is released.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to confidentiality, as sensitive system information could be exposed to unauthorized parties. This could include configuration details, API keys, or other embedded data that attackers might leverage to escalate privileges or conduct further attacks such as phishing or targeted intrusions. Organizations heavily reliant on WordPress for their digital presence and using the GetResponse plugin for email marketing are at increased risk. The exposure of sensitive data could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations due to data leakage), and potential financial losses. Since the vulnerability requires some level of authentication but no user interaction, insider threats or compromised low-privilege accounts could exploit this flaw remotely. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. European companies with extensive marketing operations or handling sensitive customer data should consider this vulnerability a priority for risk management.
Mitigation Recommendations
1. Immediately audit and restrict access to the GetResponse Email marketing plugin within WordPress, limiting it to trusted administrators only. 2. Monitor logs and network traffic for unusual access patterns or attempts to retrieve sensitive data from the plugin endpoints. 3. Disable or uninstall the plugin temporarily if it is not critical to operations until an official patch is released. 4. Implement strict role-based access controls (RBAC) within WordPress to minimize the number of users with privileges sufficient to exploit this vulnerability. 5. Use web application firewalls (WAFs) to detect and block suspicious requests targeting the plugin’s known endpoints. 6. Stay informed about updates from GetResponse and apply security patches promptly once available. 7. Conduct internal security awareness training to reduce the risk of credential compromise that could facilitate exploitation. 8. Consider isolating marketing-related WordPress instances from critical internal networks to contain potential breaches.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-29T03:08:27.752Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6943b0544eb3efac36700ad0
Added to database: 12/18/2025, 7:42:12 AM
Last enriched: 1/20/2026, 11:56:42 PM
Last updated: 2/7/2026, 6:54:38 AM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.