The Database Toolset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.4 via backup files stored in a publicly accessible location. This makes it possible for unauthenticated attackers to extract sensitive data from database backup files. An index file is present, so a brute force attack would need to be successful in order to compromise any data.
History

Sat, 03 May 2025 02:30:00 +0000

Type Values Removed Values Added
Description The Database Toolset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.4 via backup files stored in a publicly accessible location. This makes it possible for unauthenticated attackers to extract sensitive data from database backup files. An index file is present, so a brute force attack would need to be successful in order to compromise any data.
Title Database Toolset <= 1.8.4 - Unauthenticated Sensitive Information Exposure via Backup Files
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-05-03T01:43:08.183Z

Updated: 2025-05-03T01:43:08.183Z

Reserved: 2025-05-02T13:15:21.042Z

Link: CVE-2025-4222

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-05-03T03:15:29.217

Modified: 2025-05-03T03:15:29.217

Link: CVE-2025-4222

cve-icon Redhat

No data.