CVE-2025-12681
BaseFortify
Publication date: 2025-11-13
Last updated on: 2025-11-13
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wordpress | comment_edit_core | 3.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Comment Edit Core β Simple Comment Editing plugin for WordPress, affecting all versions up to and including 3.1.0. It allows unauthenticated attackers to exploit the 'ajax_get_comment' function to extract sensitive information such as user IDs, IP addresses, and email addresses.
How can this vulnerability impact me? :
The vulnerability can lead to sensitive information exposure, allowing attackers to obtain user IDs, IP addresses, and email addresses without authentication. This can result in privacy breaches, targeted attacks, or further exploitation based on the exposed data.