The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
History

Wed, 15 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
Title External Login <= 1.11.2 - Authenticated (Subscriber+) Sensitive Data Exposure via Test Connection
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-10-15T14:16:16.320Z

Reserved: 2025-09-30T17:49:32.203Z

Link: CVE-2025-11196

cve-icon Vulnrichment

Updated: 2025-10-15T14:16:11.592Z

cve-icon NVD

Status : Received

Published: 2025-10-15T09:15:42.320

Modified: 2025-10-15T09:15:42.320

Link: CVE-2025-11196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.