CVE-2025-11377
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-01

Last updated on: 2025-11-04

Assigner: Wordfence

Description
The List category posts plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 0.92.0 via the 'catlist' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-01
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-11-01
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wordpress list_category_posts 0.92.0
wordpress list_category_posts 0.93.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the WordPress plugin 'List Category Posts' (up to version 0.92.0) allows authenticated users with contributor-level access or higher to bypass restrictions and view posts that should be inaccessible, such as password-protected, private, or draft posts. This happens because the plugin does not properly sanitize the 'post_status' parameter in its 'catlist' shortcode, enabling unauthorized data exposure. The issue was fixed in version 0.93.0 by adding checks to ensure only users with Editor or Administrator roles can access private or draft posts and by properly handling password-protected content to prevent unauthorized viewing. [1]


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized disclosure of sensitive or restricted content on a WordPress site using the affected plugin. Contributors or other authenticated users with lower privileges could access private, draft, or password-protected posts that they should not see, potentially exposing confidential information or unpublished content. This could undermine content confidentiality and trust in the website's access controls. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the WordPress site is running the List Category Posts plugin version 0.92.0 or earlier. Specifically, you can verify the plugin version via the WordPress admin dashboard or by inspecting the plugin files. Additionally, to detect exploitation attempts, monitor for authenticated users with contributor-level access or higher using the 'catlist' shortcode with manipulated 'post_status' parameters to access draft or private posts. There are no specific commands provided in the resources for detection. [1]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update the List Category Posts plugin to version 0.93.0 or later, which includes a fix that sanitizes the 'post_status' parameter and properly handles password-protected content. This update ensures that only users with Editor or Administrator capabilities can view draft or private posts and prevents unauthorized exposure of password-protected content. Until the update is applied, restrict contributor-level users from using the 'catlist' shortcode or limit their access to prevent exploitation. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart