CVE-2026-25325
Information Disclosure in rtMedia for WordPress Allows Sensitive Data Exposure
Publication date: 2026-02-19
Last updated on: 2026-02-19
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rtcamp | rtmedia | to 4.7.8 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-497 | The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who do not have the same level of access to the underlying system as the product does. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-25325 is a Sensitive Data Exposure vulnerability in the WordPress plugin "rtMedia for WordPress, BuddyPress and bbPress," affecting versions up to and including 4.7.8.'}, {'type': 'paragraph', 'content': 'This vulnerability allows unauthenticated attackers to access sensitive information that is normally restricted to regular users.'}, {'type': 'paragraph', 'content': 'No special privileges are required to exploit this vulnerability.'}] [1]
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized access to sensitive system information, which may enable attackers to exploit other system weaknesses.
Although the CVSS severity score is 5.3, indicating a low priority threat with limited impact, the exposure of sensitive data can still pose risks to system security and privacy.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the vulnerability CVE-2026-25325 in rtMedia for WordPress, BuddyPress and bbPress, you should update the plugin to version 4.7.9 or later, where the issue has been patched.
Patchstack also offers auto-update options for affected plugins to ensure rapid protection.
No special privileges are required to exploit this vulnerability, so timely updating is critical to prevent unauthorized access to sensitive data.