CVE-2025-12139
BaseFortify
Publication date: 2025-11-05
Last updated on: 2025-11-06
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordfence | integrate_google_drive | 1.5.3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the File Manager for Google Drive β Integrate Google Drive with WordPress plugin up to version 1.5.3. It allows unauthenticated attackers to exploit the "get_localize_data" function to extract sensitive information such as Google OAuth credentials (client_id and client_secret) and Google account email addresses. Essentially, attackers can gain access to sensitive authentication data without needing to log in.
How can this vulnerability impact me? :
The vulnerability can lead to exposure of sensitive Google OAuth credentials and account email addresses to unauthenticated attackers. This can result in unauthorized access to Google Drive data linked to the plugin, potential misuse of OAuth credentials, and compromise of user accounts or data privacy.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability could negatively impact compliance with standards such as GDPR and HIPAA because it exposes sensitive personal and authentication data without authorization. Such exposure may violate data protection requirements related to confidentiality and secure handling of personal and sensitive information.
What immediate steps should I take to mitigate this vulnerability?
Update the Integrate Google Drive plugin for WordPress to version 1.5.4 or later, as versions up to and including 1.5.3 are vulnerable to sensitive information exposure via the get_localize_data function. [2]