Home

Description

The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possible for unauthenticated attackers to retrieve these credentials and use them to interact with the cPanel API, which can lead to arbitrary file uploads, remote code execution, and full compromise of the hosting environment.

PUBLISHED Reserved 2025-10-30 | Published 2025-11-11 | Updated 2025-11-14 | Assigner Wordfence




CRITICAL: 10.0CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-922 Insecure Storage of Sensitive Information

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-10-22:Discovered
2025-11-04:Vendor Notified
2025-11-10:Disclosed

Credits

Kenneth Dunn finder

References

www.wordfence.com/...-c11f-40d0-be69-c3ec8029a819?source=cve

github.com/...ommit/31bb3040b22c84e2d6dfd3210fe0ad045ff4ddf6

cve.org (CVE-2025-12539)

nvd.nist.gov (CVE-2025-12539)

Download JSON