Cyber Posture

CVE-2025-23774

High

Published: 22 January 2025

Published
22 January 2025
Modified
23 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0030 53.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-23774 is an Insertion of Sensitive Information Into Sent Data vulnerability (CWE-201) in the WPDB to Sql WordPress plugin developed by Niket Joshi. This issue affects all versions of the wpdb-to-sql plugin up to and including 1.2, enabling attackers to retrieve embedded sensitive data that is inadvertently included in transmitted data.

The vulnerability carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), meaning it can be exploited over the network by unauthenticated attackers requiring low complexity and no user interaction. Successful exploitation allows remote attackers to obtain high-impact confidential information, such as sensitive data embedded in responses, without impacting integrity or availability.

The Patchstack advisory (https://patchstack.com/database/Wordpress/Plugin/wpdb-to-sql/vulnerability/wordpress-wpdb-to-sql-plugin-1-2-sensitive-data-exposure-vulnerability?_s_id=cve) documents this sensitive data exposure vulnerability in the WPDB to Sql plugin version 1.2. Security practitioners should consult the advisory for specific mitigation recommendations, such as applying available patches or updates.

Details

CWE(s)
CWE-201

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability in public-facing WordPress plugin enables remote unauthenticated exploitation for sensitive data exposure.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References