Description
The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
Problem types
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Product status
*
Timeline
2025-10-14: | Disclosed |
Credits
Jonas Benjamin Friedli
References
www.wordfence.com/...-dac2-40e7-beb1-154d982f7af3?source=cve
plugins.trac.wordpress.org/...trunk/options/testing_ajax.php
plugins.trac.wordpress.org/...ernal-login/trunk/login/db.php
plugins.trac.wordpress.org/...n/trunk/views/test_results.php