The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 15 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 15 Oct 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view. | |
| Title | External Login <= 1.11.2 - Authenticated (Subscriber+) Sensitive Data Exposure via Test Connection | |
| Weaknesses | CWE-200 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-10-15T08:26:02.148Z
Updated: 2025-10-15T14:16:16.320Z
Reserved: 2025-09-30T17:49:32.203Z
Link: CVE-2025-11196
Updated: 2025-10-15T14:16:11.592Z
Status : Awaiting Analysis
Published: 2025-10-15T09:15:42.320
Modified: 2025-10-16T15:28:59.610
Link: CVE-2025-11196
No data.