CVE-2025-11693
Published: 13 December 2025
Description
The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated…
more
attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'
Mitigating Controls (NIST 800-53 r5)AI
Directly requires organizations to review, restrict, and protect publicly accessible content to prevent exposure of sensitive authentication cookies in files like cookies.txt.
Mandates protection of authenticators such as authentication cookies from unauthorized disclosure and use by unauthenticated attackers.
Requires timely identification, reporting, and remediation of flaws like the plugin vulnerability that leads to public exposure of authentication cookies.
Security SummaryAI
CVE-2025-11693 is a sensitive information exposure vulnerability (CWE-200) affecting the Export WP Page to Static HTML & PDF plugin for WordPress in all versions up to and including 4.3.4. The issue arises from publicly exposed cookies.txt files that contain authentication cookies, which can be accessed due to improper handling during backup processes.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity and no privileges required (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, score 9.8). Exploitation occurs if a site administrator triggers a backup using a specific user role like administrator, injecting authentication cookies into the publicly accessible log file, allowing attackers to retrieve them and potentially gain unauthorized access or perform further actions.
Advisories reference a WordPress plugin trac changeset (3388166) indicating a patch, and a Wordfence threat intelligence report (ID cd28ac3c-aaef-49e3-843d-8532404703c9) detailing the vulnerability. Security practitioners should update to a patched version beyond 4.3.4 and review exposed files for remediation.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability directly exposes authentication cookies in publicly accessible cookies.txt files, facilitating theft of web session cookies (T1539) and access to unsecured credentials stored in files (T1552.001).