CVE-2025-63051
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-22

Last updated on: 2026-01-28

Assigner: Patchstack

Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in sizam REHub Framework rehub-framework allows Retrieve Embedded Sensitive Data.This issue affects REHub Framework: from n/a through < 19.9.9.4.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-22
Last Modified
2026-01-28
Generated
2026-05-07
AI Q&A
2026-01-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
patchstack rehub_framework to 19.9.9.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-497 The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability involves exposure of sensitive data to unauthorized users, which could potentially lead to non-compliance with data protection standards and regulations such as GDPR and HIPAA that require safeguarding sensitive information. However, the provided resources do not explicitly discuss the impact on compliance with these standards. [1]


Can you explain this vulnerability to me?

CVE-2025-63051 is a Sensitive Data Exposure vulnerability in the WordPress REHub Framework Plugin versions before 19.9.9.4. It allows a malicious actor with subscriber-level privileges to access sensitive system information that should normally be restricted, potentially enabling further exploitation of other system weaknesses. The vulnerability is classified under OWASP Top 10 category A3: Sensitive Data Exposure and has a low severity impact with a CVSS score of 4.3. [1]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized users with subscriber-level access to retrieve sensitive information from the system. Although the severity is low, this exposure could lead to further exploitation of other vulnerabilities or unauthorized actions within the system. It is recommended to update the plugin to version 19.9.9.4 or later to mitigate this risk. [1]


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the REHub Framework Plugin to version 19.9.9.4 or later. Patchstack also offers automated updates for vulnerable plugins to provide rapid protection. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart