Description
The File Manager for Google Drive – Integrate Google Drive with WordPress plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.5.3 via the "get_localize_data" function. This makes it possible for unauthenticated attackers to extract sensitive data including Google OAuth credentials (client_id and client_secret) and Google account email addresses.
Published: 2025-11-05
Score: 7.5 High
EPSS: 15.6% Moderate
KEV: No
Impact: Sensitive Information Exposure through Credential Leak
Action: Update Plugin
AI Analysis

Impact

The vulnerability is a sensitive information exposure flaw that allows unauthenticated attackers to retrieve Google OAuth credentials, specifically client_id and client_secret, as well as account email addresses from the plugin’s configuration. The weakness, class‑enqueue.php’s get_localize_data function, exposes critical authentication details that enable an attacker to impersonate the site’s Google account or manipulate API calls on behalf of the site owner. The impact is limited to confidentiality loss of credentials and related data; it does not provide remote code execution or privilege escalation within the WordPress installation.

Affected Systems

WordPress sites using the File Manager for Google Drive – Integrate Google Drive plugin, version 1.5.3 or earlier. The affected component is the get_localize_data function within class‑enqueue.php. Sites running newer releases are not impacted.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity, and a 16% EPSS score signals a non‑negligible exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog, but the combination of an unauthenticated vector and exposed credentials makes it attractive to attackers. Successful exploitation would give an attacker access to Google OAuth tokens, enabling them to act as the site’s Google Drive user and potentially perform further malicious actions against the Google account or the site’s files.

Generated by OpenCVE AI on April 22, 2026 at 11:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the plugin to the latest released version (greater than 1.5.3) where the get_localize_data function is fixed.
  • If an update cannot be applied immediately, delete or disable the plugin to prevent unauthenticated access to the vulnerable code.
  • Remove any hard‑coded Google OAuth client_id and client_secret from WordPress configuration files and ensure they are stored securely or regenerated if needed.

Generated by OpenCVE AI on April 22, 2026 at 11:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Princeahmed
Princeahmed file Manager For Google Drive
Wordpress
Wordpress wordpress
Vendors & Products Princeahmed
Princeahmed file Manager For Google Drive
Wordpress
Wordpress wordpress

Wed, 05 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 05 Nov 2025 06:45:00 +0000

Type Values Removed Values Added
Description The File Manager for Google Drive – Integrate Google Drive with WordPress plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.5.3 via the "get_localize_data" function. This makes it possible for unauthenticated attackers to extract sensitive data including Google OAuth credentials (client_id and client_secret) and Google account email addresses.
Title File Manager for Google Drive – Integrate Google Drive with WordPress <= 1.5.3 - Unauthenticated Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Princeahmed File Manager For Google Drive
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:56:36.940Z

Reserved: 2025-10-23T23:16:11.555Z

Link: CVE-2025-12139

cve-icon Vulnrichment

Updated: 2025-11-05T14:35:31.427Z

cve-icon NVD

Status : Deferred

Published: 2025-11-05T07:15:32.340

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12139

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:00:05Z

Weaknesses