Skip to main content

CVE-2025-6745: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in xTemos Woodmart

Medium
VulnerabilityCVE-2025-6745cvecve-2025-6745cwe-200
Published: Fri Jul 11 2025 (07/11/2025, 07:22:59 UTC)
Source: CVE Database V5
Vendor/Project: xTemos
Product: Woodmart

Description

The WoodMart plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.2.5 via the woodmart_get_posts_by_query() function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:46:23 UTC

Technical Analysis

CVE-2025-6745 is a medium-severity vulnerability affecting the WoodMart plugin for WordPress, developed by xTemos. The vulnerability arises from the woodmart_get_posts_by_query() function, which lacks sufficient access control restrictions on the posts it retrieves. Specifically, this flaw allows unauthenticated attackers to query and extract content from posts that are password-protected, private, or in draft status—posts that should normally be inaccessible without proper authorization. This exposure constitutes a CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) weakness. The vulnerability affects all versions of the WoodMart plugin up to and including version 8.2.5. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality only, without affecting integrity or availability. No patches or known exploits in the wild have been reported at the time of publication. The root cause is insufficient validation of user permissions when querying posts, allowing unauthorized data disclosure. This vulnerability could be exploited by automated scripts or attackers scanning for vulnerable WordPress sites using the WoodMart plugin to harvest sensitive content that site owners intended to keep private or restricted.

Potential Impact

For European organizations using WordPress sites with the WoodMart plugin, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information. This could include internal communications, unpublished content, or proprietary data stored in private or draft posts. Such exposure can lead to reputational damage, loss of customer trust, and potential regulatory non-compliance under GDPR if personal data is leaked. Although the vulnerability does not allow modification or deletion of content, the confidentiality breach alone can have serious consequences, especially for sectors handling sensitive information such as finance, healthcare, legal, and government entities. Attackers could leverage this flaw to gather intelligence for further attacks or social engineering. The fact that no authentication or user interaction is required makes exploitation easier and increases the attack surface. European organizations with public-facing WordPress sites using WoodMart are therefore at risk of data leakage, which could also facilitate subsequent targeted attacks or phishing campaigns.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately verify if their WordPress installations use the WoodMart plugin and identify the version in use. Since no official patch links are currently available, organizations should consider the following specific actions: 1) Temporarily disable or deactivate the WoodMart plugin until a security update is released by xTemos. 2) Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the woodmart_get_posts_by_query() function or unusual queries attempting to access private or draft posts. 3) Restrict access to the WordPress REST API and admin-ajax.php endpoints, which may be leveraged to exploit this vulnerability, by IP whitelisting or authentication enforcement. 4) Review and tighten WordPress user permissions and roles to minimize exposure of sensitive content. 5) Monitor web server logs for anomalous access patterns indicative of scanning or exploitation attempts. 6) Stay informed about vendor advisories and apply official patches promptly once available. 7) Consider implementing content encryption or additional access controls on sensitive posts as a defense-in-depth measure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-26T18:14:45.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6870bdbba83201eaacacf701

Added to database: 7/11/2025, 7:31:07 AM

Last enriched: 7/11/2025, 7:46:23 AM

Last updated: 7/11/2025, 7:46:23 AM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats