Description
The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'
Published: 2025-12-13
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Immediate Patch
AI Analysis

Impact

The Export WP Page to Static HTML & PDF plugin allows unauthenticated users to download a public cookies.txt file that may contain authentication cookies injected during an administrator-triggered backup. This exposure enables an attacker to steal session tokens and potentially hijack user accounts. The vulnerability is a classic case of sensitive information exposure, classified as CWE-200.

Affected Systems

The affected product is Recorp’s Export WordPress Pages to Static HTML & PDF plugin, version 4.3.4 and all earlier releases. No other vendor or product is explicitly listed.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term. The vulnerability is not listed in CISA’s KEV catalog. An attacker can exploit this weakness simply by requesting the publicly accessible cookies.txt file, after which session hijacking or credential theft is possible.

Generated by OpenCVE AI on April 21, 2026 at 00:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Export WP Page to Static HTML & PDF plugin to version 4.3.5 or later.
  • Restrict or disable the backup feature for roles that can trigger cookie injection until the vulnerability is patched.
  • Secure or delete the publicly accessible cookies.txt log file, ensuring it is not reachable from the web by adjusting file permissions or moving it outside the public web directory.

Generated by OpenCVE AI on April 21, 2026 at 00:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 15 Dec 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Sun, 14 Dec 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 13 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'
Title Export WP Page to Static HTML & PDF <= 4.3.4 - Unauthenticated Cookie Exposure via Log File
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:23:59.528Z

Reserved: 2025-10-13T15:49:19.732Z

Link: CVE-2025-11693

cve-icon Vulnrichment

Updated: 2025-12-15T15:30:22.185Z

cve-icon NVD

Status : Deferred

Published: 2025-12-13T16:16:45.447

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11693

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:00:12Z

Weaknesses