The Database Toolset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.4 via backup files stored in a publicly accessible location. This makes it possible for unauthenticated attackers to extract sensitive data from database backup files. An index file is present, so a brute force attack would need to be successful in order to compromise any data.
History

Mon, 05 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 03 May 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Database Toolset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.4 via backup files stored in a publicly accessible location. This makes it possible for unauthenticated attackers to extract sensitive data from database backup files. An index file is present, so a brute force attack would need to be successful in order to compromise any data.
Title Database Toolset <= 1.8.4 - Unauthenticated Sensitive Information Exposure via Backup Files
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-05-03T01:43:08.183Z

Updated: 2025-05-05T14:57:43.828Z

Reserved: 2025-05-02T13:15:21.042Z

Link: CVE-2025-4222

cve-icon Vulnrichment

Updated: 2025-05-05T14:40:34.352Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-03T03:15:29.217

Modified: 2025-05-05T20:54:19.760

Link: CVE-2025-4222

cve-icon Redhat

No data.