Home

Description

The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.

PUBLISHED Reserved 2025-09-30 | Published 2025-10-15 | Updated 2025-10-15 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

*
affected

Timeline

2025-10-14:Disclosed

Credits

Jonas Benjamin Friedli finder

References

www.wordfence.com/...-dac2-40e7-beb1-154d982f7af3?source=cve

plugins.trac.wordpress.org/...trunk/options/testing_ajax.php

plugins.trac.wordpress.org/...ernal-login/trunk/login/db.php

plugins.trac.wordpress.org/...n/trunk/views/test_results.php

cve.org (CVE-2025-11196)

nvd.nist.gov (CVE-2025-11196)

Download JSON