Cyber Posture

CVE-2025-12539

Critical

Published: 11 November 2025

Published
11 November 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0072 72.6th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-12539 is a critical-severity Insecure Storage of Sensitive Information (CWE-922) vulnerability in Wordfence (inferred from references). Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 27.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-22 (Publicly Accessible Content) and CM-12 (Information Location).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-22 requires controlling and reviewing publicly accessible content to ensure sensitive information like cPanel credentials is not exposed in web-accessible directories such as wp-content.

prevent

SC-28 mandates protection of the confidentiality of information at rest, preventing plaintext storage of cPanel API credentials in files that could be accessed by attackers.

prevent

CM-12 requires identifying locations of sensitive information like stored cPanel credentials and implementing protections to prevent their exposure in web-accessible paths.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

The vulnerability enables exploitation of a public-facing WordPress application (T1190) through unauthenticated access to plain-text files containing cPanel API credentials, directly facilitating unsecured credentials in files (T1552.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

The TNC Toolbox: Web Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.2. This is due to the plugin storing cPanel API credentials (hostname, username, and API key) in files within…

more

the web-accessible wp-content directory without adequate protection in the "Tnc_Wp_Toolbox_Settings::save_settings" function. This makes it possible for unauthenticated attackers to retrieve these credentials and use them to interact with the cPanel API, which can lead to arbitrary file uploads, remote code execution, and full compromise of the hosting environment.

Deeper analysisAI

CVE-2025-12539 is a sensitive information exposure vulnerability in the TNC Toolbox: Web Performance plugin for WordPress, affecting all versions up to and including 1.4.2. The issue arises in the "Tnc_Wp_Toolbox_Settings::save_settings" function, which stores cPanel API credentials—including hostname, username, and API key—in files within the web-accessible wp-content directory without adequate protection. This exposure has a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and is linked to CWE-922.

Unauthenticated attackers can exploit this vulnerability by directly accessing the exposed files to retrieve the cPanel credentials. Armed with these details, attackers can interact with the cPanel API to perform actions such as arbitrary file uploads, remote code execution, and full compromise of the hosting environment.

Advisories reference a fix in the GitHub commit at https://github.com/The-Network-Crew/TNC-Toolbox-for-WordPress/commit/31bb3040b22c84e2d6dfd3210fe0ad045ff4ddf6. Additional threat intelligence is provided by Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/2eaa5a5c-c11f-40d0-be69-c3ec8029a819?source=cve.

Details

CWE(s)

Affected Products

Wordfence
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2025-22984Shared CWE-922
CVE-2025-22983Shared CWE-922
CVE-2024-56113Shared CWE-922
CVE-2024-57546Shared CWE-922
CVE-2026-40868Shared CWE-922
CVE-2024-57436Shared CWE-922
CVE-2025-28244Shared CWE-922
CVE-2025-21299Shared CWE-922
CVE-2024-12315Shared CWE-922
CVE-2025-2241Shared CWE-922

References