Cyber Posture

CVE-2025-11008

Critical

Published: 04 November 2025

Published
04 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0021 42.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-11008 is a critical-severity Insertion of Sensitive Information into Log File (CWE-532) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-9 (Protection of Audit Information).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly remediates the software flaw in the CE21 Suite plugin that improperly stores authentication credentials in an exposed log file.

prevent

Protects log files containing sensitive authentication credentials from unauthorized access, modification, deletion, and fabrication by unauthenticated attackers.

prevent

Enforces approved authorizations to prevent unauthenticated remote access to the plugin's log file exposing credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

The vulnerability allows unauthenticated remote access to a log file exposing authentication credentials (T1552.001) via exploitation of a public-facing WordPress plugin (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The CE21 Suite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.1 via the log file. This makes it possible for unauthenticated attackers to extract sensitive data including authentication credentials, which can…

more

be used to log in as other users as long as they have used the plugin's custom authentication feature before. This may include administrators, which makes a complete site takeover possible.

Deeper analysisAI

CVE-2025-11008 is a sensitive information exposure vulnerability (CWE-532) in the CE21 Suite plugin for WordPress, affecting all versions up to and including 2.3.1. The flaw occurs via the plugin's log file, which improperly stores and exposes sensitive data such as authentication credentials.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity, as indicated by its CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By accessing the log file, they can extract credentials used by other users who have previously utilized the plugin's custom authentication feature. This enables attackers to log in as those users, potentially including administrators, resulting in full site takeover.

Mitigation details are available in advisories from Wordfence (https://www.wordfence.com/threat-intel/vulnerabilities/id/91aa86d9-8e42-4deb-b6ca-c3b388fefcb1?source=cve) and the plugin's WordPress page (https://wordpress.org/plugins/ce21-suite/).

Details

CWE(s)

Affected Products

Wordpress
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2024-7577Shared CWE-532
CVE-2025-1075Shared CWE-532
CVE-2026-27900Shared CWE-532
CVE-2026-25813Shared CWE-532
CVE-2024-48852Shared CWE-532
CVE-2026-23775Shared CWE-532
CVE-2026-34487Shared CWE-532
CVE-2025-66236Shared CWE-532
CVE-2026-24762Shared CWE-532
CVE-2026-22778Shared CWE-532

References