Description
The Analytify Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.0.3 via the Analytify Tag HTML details. This makes it possible for unauthenticated attackers to extract usernames from source code. While we generally do not assign CVE IDs to username exposure issues, this vendor has specifically requested we consider it a vulnerability.
Published: 2025-10-31
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure
Action: Patch
AI Analysis

Impact

The Analytify Pro WordPress plugin contains a sensitive information exposure flaw that allows unauthenticated users to view usernames embedded in the source code via the Analytify Tag HTML details function. This vulnerability enables attackers to access usernames without requiring any credentials, but it does not provide a route to alter or disrupt the underlying system.

Affected Systems

All installations of Analytify Pro version 7.0.3 or earlier running on a WordPress site may be affected, independent of theme or other plugins, because the flaw resides within the plugin code itself.

Risk and Exploitability

The CVSS score of 5.3 classifies this as moderate, while an EPSS score of less than 1% indicates a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit it without authentication by simply visiting a site that contains the vulnerable plugin and viewing the publicly accessible pages containing the Tag HTML details.

Generated by OpenCVE AI on April 22, 2026 at 00:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Analytify Pro to the latest supported version, which removes the vulnerable Tag HTML details feature.
  • If an update is unavailable, disable or remove the Tag HTML details component within the plugin settings or via code modification to prevent username exposure.
  • When neither update nor disable options are feasible, uninstall the Analytify Pro plugin entirely until a fix is released.
  • Regularly review the WordPress plugin repository and vendor announcements for security patches.

Generated by OpenCVE AI on April 22, 2026 at 00:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 31 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 31 Oct 2025 14:00:00 +0000

Type Values Removed Values Added
Description The Analytify Pro plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.0.3 via the Analytify Tag HTML details. This makes it possible for unauthenticated attackers to extract usernames from source code. While we generally do not assign CVE IDs to username exposure issues, this vendor has specifically requested we consider it a vulnerability.
Title Analytify Pro <= 7.0.3 - Unauthenticated Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:08.490Z

Reserved: 2025-10-30T16:34:15.561Z

Link: CVE-2025-12521

cve-icon Vulnrichment

Updated: 2025-10-31T17:49:12.024Z

cve-icon NVD

Status : Deferred

Published: 2025-10-31T14:16:12.487

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:45:04Z

Weaknesses