CVE-2025-11377
BaseFortify
Publication date: 2025-11-01
Last updated on: 2025-11-04
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | list_category_posts | 0.92.0 |
| wordpress | list_category_posts | 0.93.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the WordPress plugin 'List Category Posts' (up to version 0.92.0) allows authenticated users with contributor-level access or higher to bypass restrictions and view posts that should be inaccessible, such as password-protected, private, or draft posts. This happens because the plugin does not properly sanitize the 'post_status' parameter in its 'catlist' shortcode, enabling unauthorized data exposure. The issue was fixed in version 0.93.0 by adding checks to ensure only users with Editor or Administrator roles can access private or draft posts and by properly handling password-protected content to prevent unauthorized viewing. [1]
How can this vulnerability impact me? :
This vulnerability can lead to unauthorized disclosure of sensitive or restricted content on a WordPress site using the affected plugin. Contributors or other authenticated users with lower privileges could access private, draft, or password-protected posts that they should not see, potentially exposing confidential information or unpublished content. This could undermine content confidentiality and trust in the website's access controls. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking if the WordPress site is running the List Category Posts plugin version 0.92.0 or earlier. Specifically, you can verify the plugin version via the WordPress admin dashboard or by inspecting the plugin files. Additionally, to detect exploitation attempts, monitor for authenticated users with contributor-level access or higher using the 'catlist' shortcode with manipulated 'post_status' parameters to access draft or private posts. There are no specific commands provided in the resources for detection. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the List Category Posts plugin to version 0.93.0 or later, which includes a fix that sanitizes the 'post_status' parameter and properly handles password-protected content. This update ensures that only users with Editor or Administrator capabilities can view draft or private posts and prevents unauthorized exposure of password-protected content. Until the update is applied, restrict contributor-level users from using the 'catlist' shortcode or limit their access to prevent exploitation. [1]