Home

Description

The PowerBI Embed Reports plugin for WordPress is vulnerable to Sensitive Information Disclosure in all versions up to, and including, 1.2.0. This is due to missing capability checks and authentication verification on the 'testUser' endpoint accessible via the mo_epbr_admin_observer() function hooked on 'init'. This makes it possible for unauthenticated attackers to access sensitive Azure AD user information including personal identifiable information (PII) such as displayName, mail, phones, department, or detailed OAuth error data including Azure AD Application/Client IDs, error codes, trace IDs, and correlation IDs.

PUBLISHED Reserved 2025-09-19 | Published 2025-10-18 | Updated 2025-10-18 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

*
affected

Timeline

2025-10-17:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-16e8-425c-ac46-a467a2fd0133?source=cve

plugins.trac.wordpress.org/...microsoft-power-bi-reports.php

plugins.trac.wordpress.org/...2.0/Observer/adminObserver.php

plugins.trac.wordpress.org/...2.0/Observer/adminObserver.php

plugins.trac.wordpress.org/...-reports&sfp_email=&sfph_mail=

cve.org (CVE-2025-10750)

nvd.nist.gov (CVE-2025-10750)

Download JSON