CVE-2025-12139
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-05

Last updated on: 2025-11-06

Assigner: Wordfence

Description
The File Manager for Google Drive – Integrate Google Drive with WordPress plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.5.3 via the "get_localize_data" function. This makes it possible for unauthenticated attackers to extract sensitive data including Google OAuth credentials (client_id and client_secret) and Google account email addresses.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-05
Last Modified
2025-11-06
Generated
2026-05-07
AI Q&A
2025-11-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wordfence integrate_google_drive 1.5.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the File Manager for Google Drive – Integrate Google Drive with WordPress plugin up to version 1.5.3. It allows unauthenticated attackers to exploit the "get_localize_data" function to extract sensitive information such as Google OAuth credentials (client_id and client_secret) and Google account email addresses. Essentially, attackers can gain access to sensitive authentication data without needing to log in.


How can this vulnerability impact me? :

The vulnerability can lead to exposure of sensitive Google OAuth credentials and account email addresses to unauthenticated attackers. This can result in unauthorized access to Google Drive data linked to the plugin, potential misuse of OAuth credentials, and compromise of user accounts or data privacy.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability could negatively impact compliance with standards such as GDPR and HIPAA because it exposes sensitive personal and authentication data without authorization. Such exposure may violate data protection requirements related to confidentiality and secure handling of personal and sensitive information.


What immediate steps should I take to mitigate this vulnerability?

Update the Integrate Google Drive plugin for WordPress to version 1.5.4 or later, as versions up to and including 1.5.3 are vulnerable to sensitive information exposure via the get_localize_data function. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart