The WP Reset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.05 via the WF_Licensing::log() method when debugging is enabled (default). This makes it possible for unauthenticated attackers to extract sensitive license key and site data.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Oct 2025 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Webfactoryltd
Webfactoryltd wp Reset
Wordpress
Wordpress wordpress
Vendors & Products Webfactoryltd
Webfactoryltd wp Reset
Wordpress
Wordpress wordpress

Tue, 07 Oct 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Oct 2025 22:45:00 +0000

Type Values Removed Values Added
Description The WP Reset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.05 via the WF_Licensing::log() method when debugging is enabled (default). This makes it possible for unauthenticated attackers to extract sensitive license key and site data.
Title WP Reset <= 2.05 - Unauthenticated Sensitive Information Exposure via wf-licensing.log
Weaknesses CWE-532
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-10-07T18:20:23.922Z

Reserved: 2025-09-17T16:16:05.766Z

Link: CVE-2025-10645

cve-icon Vulnrichment

Updated: 2025-10-07T18:20:18.080Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-07T09:15:32.610

Modified: 2025-10-08T19:38:32.610

Link: CVE-2025-10645

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-08T13:39:12Z