Impact
The Export WP Page to Static HTML & PDF plugin allows unauthenticated users to download a public cookies.txt file that may contain authentication cookies injected during an administrator-triggered backup. This exposure enables an attacker to steal session tokens and potentially hijack user accounts. The vulnerability is a classic case of sensitive information exposure, classified as CWE-200.
Affected Systems
The affected product is Recorp’s Export WordPress Pages to Static HTML & PDF plugin, version 4.3.4 and all earlier releases. No other vendor or product is explicitly listed.
Risk and Exploitability
The CVSS score of 9.8 indicates a critical severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term. The vulnerability is not listed in CISA’s KEV catalog. An attacker can exploit this weakness simply by requesting the publicly accessible cookies.txt file, after which session hijacking or credential theft is possible.
OpenCVE Enrichment