Home

Description

The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.

PUBLISHED Reserved 2025-12-02 | Published 2026-01-24 | Updated 2026-01-24 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-02:Vendor Notified
2026-01-23:Disclosed

Credits

Sarawut Poolkhet finder

References

www.wordfence.com/...-d3c8-4ae8-818c-df3e6ed2ad9c?source=cve

plugins.trac.wordpress.org/changeset/3435482/wpdirectorykit

cve.org (CVE-2025-13920)

nvd.nist.gov (CVE-2025-13920)

Download JSON