Description
The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
Published: 2025-10-15
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Update
AI Analysis

Impact

The vulnerability resides in the External Login WordPress plugin, allowing an attacker who is authenticated with subscriber-level or higher privileges to misuse an AJAX endpoint that lacks proper capability checks or nonce validation. Exploiting the 'exlog_test_connection' action grants access to diagnostic test results, from which truncated usernames, email addresses, and password hashes of the configured external database can be retrieved. This constitutes a moderate confidentiality compromise, exposing user credentials and personal information to an attacker who can already log into the site.

Affected Systems

WordPress sites that have the External Login plugin installed in versions 1.11.2 or earlier are impacted. The issue is documented for all releases up to and including 1.11.2; newer releases have removed the insecure AJAX action or added appropriate checks. Site owners should verify the plugin version and update to the latest available release.

Risk and Exploitability

The CVSS score of 4.3 places this vulnerability in the medium severity range. The EPSS score of less than 1% indicates that the probability of exploitation is low according to current data, and the vulnerability is not listed in the CISA KEV catalog. An attacker still requires authenticated access, but subscribers can gain the necessary privileges. Once accessed, the exposed data can be used for credential stuffing, phishing, or account takeover. The attack path relies on an authenticated AJAX call to the 'exlog_test_connection' action, which lacks capability checks or nonce validation, allowing a subscriber to retrieve diagnostic test results that include truncated usernames, email addresses, and password hashes. This can be performed from any network that can reach the site’s public interface.

Generated by OpenCVE AI on April 21, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the External Login plugin to the latest version that does not expose the 'exlog_test_connection' AJAX action.
  • If an update is not immediately available, disable the test connection feature or remove the AJAX handler by editing the plugin code to enforce proper capability checks and nonce validation, thereby mitigating CWE-200.
  • Restrict subscriber role capabilities or use role‑based access controls to limit unused privileges until the plugin is updated.

Generated by OpenCVE AI on April 21, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 15 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
Title External Login <= 1.11.2 - Authenticated (Subscriber+) Sensitive Data Exposure via Test Connection
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:18:59.919Z

Reserved: 2025-09-30T17:49:32.203Z

Link: CVE-2025-11196

cve-icon Vulnrichment

Updated: 2025-10-15T14:16:11.592Z

cve-icon NVD

Status : Deferred

Published: 2025-10-15T09:15:42.320

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:00:36Z

Weaknesses