CVE-2025-11008
Published: 04 November 2025
Summary
CVE-2025-11008 is a critical-severity Insertion of Sensitive Information into Log File (CWE-532) vulnerability in Wordpress (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 42.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and AU-9 (Protection of Audit Information).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly remediates the software flaw in the CE21 Suite plugin that improperly stores authentication credentials in an exposed log file.
Protects log files containing sensitive authentication credentials from unauthorized access, modification, deletion, and fabrication by unauthenticated attackers.
Enforces approved authorizations to prevent unauthenticated remote access to the plugin's log file exposing credentials.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability allows unauthenticated remote access to a log file exposing authentication credentials (T1552.001) via exploitation of a public-facing WordPress plugin (T1190).
NVD Description
The CE21 Suite plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.1 via the log file. This makes it possible for unauthenticated attackers to extract sensitive data including authentication credentials, which can…
more
be used to log in as other users as long as they have used the plugin's custom authentication feature before. This may include administrators, which makes a complete site takeover possible.
Deeper analysisAI
CVE-2025-11008 is a sensitive information exposure vulnerability (CWE-532) in the CE21 Suite plugin for WordPress, affecting all versions up to and including 2.3.1. The flaw occurs via the plugin's log file, which improperly stores and exposes sensitive data such as authentication credentials.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity, as indicated by its CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). By accessing the log file, they can extract credentials used by other users who have previously utilized the plugin's custom authentication feature. This enables attackers to log in as those users, potentially including administrators, resulting in full site takeover.
Mitigation details are available in advisories from Wordfence (https://www.wordfence.com/threat-intel/vulnerabilities/id/91aa86d9-8e42-4deb-b6ca-c3b388fefcb1?source=cve) and the plugin's WordPress page (https://wordpress.org/plugins/ce21-suite/).
Details
- CWE(s)