Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67621: Exposure of Sensitive System Information to an Unauthorized Control Sphere in 10up Eight Day Week Print Workflow

0
High
VulnerabilityCVE-2025-67621cvecve-2025-67621
Published: Wed Dec 24 2025 (12/24/2025, 13:10:20 UTC)
Source: CVE Database V5
Vendor/Project: 10up
Product: Eight Day Week Print Workflow

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in 10up Eight Day Week Print Workflow eight-day-week-print-workflow allows Retrieve Embedded Sensitive Data.This issue affects Eight Day Week Print Workflow: from n/a through <= 1.2.5.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:08:23 UTC

Technical Analysis

CVE-2025-67621 is a vulnerability identified in the 10up Eight Day Week Print Workflow plugin, affecting versions up to and including 1.2.5. This flaw allows an attacker without any privileges or user interaction to remotely retrieve embedded sensitive system information from the affected system. The vulnerability stems from improper access control mechanisms within the plugin that expose confidential data embedded in the print workflow processes. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the vulnerability's network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope remains unchanged (S:U), but the confidentiality impact is high (C:H), while integrity and availability impacts are none (I:N, A:N). This means attackers can access sensitive data but cannot modify or disrupt system operations. No known exploits have been reported in the wild as of the publication date (December 24, 2025), but the vulnerability's characteristics make it a prime candidate for exploitation. The plugin is commonly used in WordPress environments to manage print workflows, and the exposure of sensitive data could include configuration details, credentials, or other embedded information critical to system security. The lack of a patch link suggests that a fix may be pending or that users must monitor vendor communications closely. The vulnerability was reserved and published within a short timeframe, indicating active tracking by security researchers and vendors.

Potential Impact

For European organizations, the exposure of sensitive system information can lead to significant confidentiality breaches, potentially revealing internal configurations, credentials, or other data that could facilitate further attacks such as lateral movement or privilege escalation. Organizations relying on the Eight Day Week Print Workflow plugin in their WordPress environments—especially those handling sensitive or regulated data—face increased risks of data leakage. This could impact sectors such as government, finance, healthcare, and media, where print workflows are integrated into document management systems. The vulnerability does not directly affect system integrity or availability, but the confidentiality breach alone can result in compliance violations under GDPR and other data protection regulations, leading to legal and financial repercussions. Additionally, exposed information could be leveraged by threat actors for targeted phishing or social engineering campaigns. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the threat landscape for European enterprises using this plugin.

Mitigation Recommendations

1. Monitor official 10up communications and security advisories for the release of a patch addressing CVE-2025-67621 and apply it immediately upon availability. 2. Until a patch is released, restrict access to the Eight Day Week Print Workflow plugin endpoints by implementing network-level controls such as IP whitelisting or VPN-only access to the management interfaces. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin’s vulnerable functionality. 4. Conduct an audit of current deployments to identify all instances of the plugin and assess exposure levels. 5. Limit the plugin’s permissions and disable or remove unused features that may expose sensitive data. 6. Implement strict role-based access controls (RBAC) within WordPress to minimize unauthorized access. 7. Monitor logs for unusual access patterns or data retrieval attempts related to the plugin. 8. Educate IT and security teams about this vulnerability to ensure rapid response and incident handling if exploitation attempts occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T16:46:41.863Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694bea1c279c98bf57f751e5

Added to database: 12/24/2025, 1:26:52 PM

Last enriched: 1/21/2026, 1:08:23 AM

Last updated: 2/7/2026, 2:51:45 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats