CVE-2025-7368: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to Information Exposure in all versions up to, and including, 19.9.7 via the 'ajax_action_re_getfullcontent' function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected posts that they should not have access to.
AI Analysis
Technical Summary
CVE-2025-7368 is a medium-severity vulnerability affecting the REHub WordPress theme, specifically versions up to and including 19.9.7. The issue arises from the 'ajax_action_re_getfullcontent' function, which lacks sufficient access control checks on which posts can be retrieved via AJAX requests. This flaw allows unauthenticated attackers to bypass intended access restrictions and extract content from password-protected posts. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Exploitation does not require authentication or user interaction, and the attack vector is network-based (remote). The vulnerability impacts confidentiality but does not affect integrity or availability. There are no known exploits in the wild at this time, and no official patches have been released yet. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to ease of exploitation combined with limited impact scope.
Potential Impact
For European organizations using the REHub WordPress theme, this vulnerability poses a risk of unauthorized data disclosure. Sensitive or proprietary information stored in password-protected posts—such as pricing data, vendor details, or internal communications—could be exposed to attackers without any authentication. This could lead to competitive disadvantage, reputational damage, or regulatory compliance issues, especially under GDPR where unauthorized data exposure can result in significant fines. Since REHub is a popular theme for e-commerce and multi-vendor marketplaces, businesses relying on it for online sales or price comparison services may face confidentiality breaches. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the exposure of sensitive business data can indirectly affect trust and operational security.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the REHub theme is in use and confirm the version. Until an official patch is released, organizations should consider the following mitigations: 1) Disable or restrict access to the vulnerable AJAX endpoint ('ajax_action_re_getfullcontent') via web application firewall (WAF) rules or server configuration to block unauthenticated requests. 2) Implement additional access controls at the web server or application level to enforce authentication before allowing access to sensitive post content. 3) Review and limit the use of password-protected posts containing sensitive information, possibly migrating such content to more secure platforms or plugins with robust access controls. 4) Monitor web server logs for suspicious access patterns targeting the AJAX endpoint. 5) Plan for timely updates to the REHub theme once a security patch is released by the vendor. 6) Consider deploying security plugins that can detect and block unauthorized content scraping attempts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-7368: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in sizam REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme
Description
The REHub - Price Comparison, Multi Vendor Marketplace Wordpress Theme theme for WordPress is vulnerable to Information Exposure in all versions up to, and including, 19.9.7 via the 'ajax_action_re_getfullcontent' function due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected posts that they should not have access to.
AI-Powered Analysis
Technical Analysis
CVE-2025-7368 is a medium-severity vulnerability affecting the REHub WordPress theme, specifically versions up to and including 19.9.7. The issue arises from the 'ajax_action_re_getfullcontent' function, which lacks sufficient access control checks on which posts can be retrieved via AJAX requests. This flaw allows unauthenticated attackers to bypass intended access restrictions and extract content from password-protected posts. The vulnerability is classified under CWE-200, indicating exposure of sensitive information to unauthorized actors. Exploitation does not require authentication or user interaction, and the attack vector is network-based (remote). The vulnerability impacts confidentiality but does not affect integrity or availability. There are no known exploits in the wild at this time, and no official patches have been released yet. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to ease of exploitation combined with limited impact scope.
Potential Impact
For European organizations using the REHub WordPress theme, this vulnerability poses a risk of unauthorized data disclosure. Sensitive or proprietary information stored in password-protected posts—such as pricing data, vendor details, or internal communications—could be exposed to attackers without any authentication. This could lead to competitive disadvantage, reputational damage, or regulatory compliance issues, especially under GDPR where unauthorized data exposure can result in significant fines. Since REHub is a popular theme for e-commerce and multi-vendor marketplaces, businesses relying on it for online sales or price comparison services may face confidentiality breaches. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. However, the exposure of sensitive business data can indirectly affect trust and operational security.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify if the REHub theme is in use and confirm the version. Until an official patch is released, organizations should consider the following mitigations: 1) Disable or restrict access to the vulnerable AJAX endpoint ('ajax_action_re_getfullcontent') via web application firewall (WAF) rules or server configuration to block unauthenticated requests. 2) Implement additional access controls at the web server or application level to enforce authentication before allowing access to sensitive post content. 3) Review and limit the use of password-protected posts containing sensitive information, possibly migrating such content to more secure platforms or plugins with robust access controls. 4) Monitor web server logs for suspicious access patterns targeting the AJAX endpoint. 5) Plan for timely updates to the REHub theme once a security patch is released by the vendor. 6) Consider deploying security plugins that can detect and block unauthorized content scraping attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-07-08T19:16:31.343Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb9510535f4a97731d3e19
Added to database: 9/6/2025, 1:57:36 AM
Last enriched: 9/6/2025, 2:12:59 AM
Last updated: 9/8/2025, 12:09:46 AM
Views: 17
Related Threats
CVE-2025-10070: Improper Access Controls in Portabilis i-Educar
MediumCVE-2025-3067: Inappropriate implementation in Google Chrome
HighCVE-2025-1939: Tapjacking in Android Custom Tabs using transition animations in Mozilla Firefox
LowCVE-2025-10073: Improper Authorization in Portabilis i-Educar
MediumCVE-2025-10072: Improper Access Controls in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.