Description
The Content Writer plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.8 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.
Published: 2025-10-15
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Update Plugin
AI Analysis

Impact

The Content Writer plugin for WordPress permits unauthenticated viewing of log files that can contain sensitive data. The weakness originates from publicly exposed log files due to missing access controls, matching CWE‑532. This allows an attacker to retrieve potentially confidential information by accessing the log file URL. Affected systems are installations of the steadycontent Content Writer plugin for WordPress in any version up to and including 3.6.8, regardless of user permissions. The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests low likelihood of exploitation. The vulnerability is not listed in CISA KEV. Attackers can reach the exposed log files directly via a web request, so administrators should remedy the issue promptly by updating the plugin, restricting log file access, or removing the logs.

Affected Systems

Installations of the steadycontent Content Writer plugin for WordPress, versions 3.6.8 and earlier, deployed on any WordPress site are affected.

Risk and Exploitability

The vulnerability carries a medium severity CVSS score of 5.3. The EPSS value of under 1% points to a low probability of exploitation in the near term. The vulnerability is not present in the CISA KEV catalog. Adversaries can exploit it by issuing a simple HTTP request to the publicly accessible log file URL, requiring no authentication or elevated privileges. This straightforward attacker path increases risk for sites with publicly readable logs.

Generated by OpenCVE AI on April 21, 2026 at 18:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Content Writer plugin to any release newer than 3.6.8, which removes the publicly exposed log file handler.
  • Configure the web server or WordPress file permissions to deny HTTP access to the logs directory, ensuring that log files cannot be retrieved via a web request.
  • If an upgrade cannot be performed immediately, delete existing world‑readable log files and configure the plugin or host environment to generate logs with restrictive ownership and permissions, or disable logging for this plugin if an option is available.

Generated by OpenCVE AI on April 21, 2026 at 18:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Content Writer plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.8 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log files.
Title Content Writer <= 3.6.8 - Unauthenticated Information Exposure via Log File
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:18:24.553Z

Reserved: 2025-09-15T14:12:29.662Z

Link: CVE-2025-10486

cve-icon Vulnrichment

Updated: 2025-10-15T13:23:09.065Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:40.547

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10486

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:00:36Z

Weaknesses