CVE-2025-6745: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in xTemos Woodmart
The WoodMart plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.2.5 via the woodmart_get_posts_by_query() function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.
AI Analysis
Technical Summary
CVE-2025-6745 is a medium-severity vulnerability affecting the WoodMart plugin for WordPress, developed by xTemos. The vulnerability arises from the woodmart_get_posts_by_query() function, which lacks sufficient access control restrictions on the posts it retrieves. Specifically, this flaw allows unauthenticated attackers to query and extract content from posts that are password-protected, private, or in draft status—posts that should normally be inaccessible without proper authorization. This exposure constitutes a CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) weakness. The vulnerability affects all versions of the WoodMart plugin up to and including version 8.2.5. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality only, without affecting integrity or availability. No patches or known exploits in the wild have been reported at the time of publication. The root cause is insufficient validation of user permissions when querying posts, allowing unauthorized data disclosure. This vulnerability could be exploited by automated scripts or attackers scanning for vulnerable WordPress sites using the WoodMart plugin to harvest sensitive content that site owners intended to keep private or restricted.
Potential Impact
For European organizations using WordPress sites with the WoodMart plugin, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information. This could include internal communications, unpublished content, or proprietary data stored in private or draft posts. Such exposure can lead to reputational damage, loss of customer trust, and potential regulatory non-compliance under GDPR if personal data is leaked. Although the vulnerability does not allow modification or deletion of content, the confidentiality breach alone can have serious consequences, especially for sectors handling sensitive information such as finance, healthcare, legal, and government entities. Attackers could leverage this flaw to gather intelligence for further attacks or social engineering. The fact that no authentication or user interaction is required makes exploitation easier and increases the attack surface. European organizations with public-facing WordPress sites using WoodMart are therefore at risk of data leakage, which could also facilitate subsequent targeted attacks or phishing campaigns.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if their WordPress installations use the WoodMart plugin and identify the version in use. Since no official patch links are currently available, organizations should consider the following specific actions: 1) Temporarily disable or deactivate the WoodMart plugin until a security update is released by xTemos. 2) Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the woodmart_get_posts_by_query() function or unusual queries attempting to access private or draft posts. 3) Restrict access to the WordPress REST API and admin-ajax.php endpoints, which may be leveraged to exploit this vulnerability, by IP whitelisting or authentication enforcement. 4) Review and tighten WordPress user permissions and roles to minimize exposure of sensitive content. 5) Monitor web server logs for anomalous access patterns indicative of scanning or exploitation attempts. 6) Stay informed about vendor advisories and apply official patches promptly once available. 7) Consider implementing content encryption or additional access controls on sensitive posts as a defense-in-depth measure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-6745: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in xTemos Woodmart
Description
The WoodMart plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 8.2.5 via the woodmart_get_posts_by_query() function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.
AI-Powered Analysis
Technical Analysis
CVE-2025-6745 is a medium-severity vulnerability affecting the WoodMart plugin for WordPress, developed by xTemos. The vulnerability arises from the woodmart_get_posts_by_query() function, which lacks sufficient access control restrictions on the posts it retrieves. Specifically, this flaw allows unauthenticated attackers to query and extract content from posts that are password-protected, private, or in draft status—posts that should normally be inaccessible without proper authorization. This exposure constitutes a CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) weakness. The vulnerability affects all versions of the WoodMart plugin up to and including version 8.2.5. The CVSS v3.1 base score is 5.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network without any privileges or user interaction, and it impacts confidentiality only, without affecting integrity or availability. No patches or known exploits in the wild have been reported at the time of publication. The root cause is insufficient validation of user permissions when querying posts, allowing unauthorized data disclosure. This vulnerability could be exploited by automated scripts or attackers scanning for vulnerable WordPress sites using the WoodMart plugin to harvest sensitive content that site owners intended to keep private or restricted.
Potential Impact
For European organizations using WordPress sites with the WoodMart plugin, this vulnerability poses a risk of unauthorized disclosure of sensitive or confidential information. This could include internal communications, unpublished content, or proprietary data stored in private or draft posts. Such exposure can lead to reputational damage, loss of customer trust, and potential regulatory non-compliance under GDPR if personal data is leaked. Although the vulnerability does not allow modification or deletion of content, the confidentiality breach alone can have serious consequences, especially for sectors handling sensitive information such as finance, healthcare, legal, and government entities. Attackers could leverage this flaw to gather intelligence for further attacks or social engineering. The fact that no authentication or user interaction is required makes exploitation easier and increases the attack surface. European organizations with public-facing WordPress sites using WoodMart are therefore at risk of data leakage, which could also facilitate subsequent targeted attacks or phishing campaigns.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should immediately verify if their WordPress installations use the WoodMart plugin and identify the version in use. Since no official patch links are currently available, organizations should consider the following specific actions: 1) Temporarily disable or deactivate the WoodMart plugin until a security update is released by xTemos. 2) Implement web application firewall (WAF) rules to detect and block suspicious requests targeting the woodmart_get_posts_by_query() function or unusual queries attempting to access private or draft posts. 3) Restrict access to the WordPress REST API and admin-ajax.php endpoints, which may be leveraged to exploit this vulnerability, by IP whitelisting or authentication enforcement. 4) Review and tighten WordPress user permissions and roles to minimize exposure of sensitive content. 5) Monitor web server logs for anomalous access patterns indicative of scanning or exploitation attempts. 6) Stay informed about vendor advisories and apply official patches promptly once available. 7) Consider implementing content encryption or additional access controls on sensitive posts as a defense-in-depth measure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-26T18:14:45.464Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6870bdbba83201eaacacf701
Added to database: 7/11/2025, 7:31:07 AM
Last enriched: 7/11/2025, 7:46:23 AM
Last updated: 7/11/2025, 7:46:23 AM
Views: 2
Related Threats
CVE-2025-6788: CWE-668 Exposure of Resource to Wrong Sphere in Schneider Electric EcoStruxure Power Monitoring Expert (PME)
MediumCVE-2025-50125: CWE-918 Server-Side Request Forgery (SSRF) in Schneider Electric EcoStruxure IT Data Center Expert
MediumCVE-2025-50124: CWE-269 Improper Privilege Management in Schneider Electric EcoStruxure IT Data Center Expert
HighPatch, track, repeat
MediumPre-Auth SQL Injection to RCE - Fortinet FortiWeb Fabric Connector (CVE-2025-25257) - watchTowr Labs
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.