Description
The Locker Content plugin for WordPress is vulnerable to Sensitive Information Exposure in version 1.0.0 via the 'lockerco_submit_post' AJAX endpoint. This makes it possible for unauthenticated attackers to extract content from posts that has been protected by the plugin.
Published: 2025-11-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Update Plugin
AI Analysis

Impact

A recent WordPress plugin, Locker Content, includes an AJAX endpoint named 'lockerco_submit_post' that is accessible without authentication. This endpoint returns the full content of posts that have been protected by the plugin, allowing an attacker to enumerate and download confidential information from a site. The vulnerability is a direct information disclosure weakness, classified under CWE‑200. When exploited, the attacker can read any protected post, potentially revealing private data, intellectual property, or sensitive user content.

Affected Systems

The affected product is the Locker Content plugin for WordPress, provided by appglut. Version 1.0.0, as released and listed by the CNA, is vulnerable. Any WordPress site running this version and exposing the AJAX endpoint is at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and an EPSS score of less than 1% suggests a low likelihood of exploitation in the near term. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to discover the site URL and then send a simple, unauthenticated POST request to the AJAX endpoint, which is a web‑reachable vector. Because the error does not require elevated privileges, the attack could be executed from any network with access to the public site. The overall risk is moderate in impact, but the probability of exploitation is currently low.

Generated by OpenCVE AI on April 22, 2026 at 00:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Locker Content to the latest available version that removes the unauthenticated AJAX exposure
  • If upgrading is not immediately possible, temporarily disable or protect the 'lockerco_submit_post' endpoint by adding authentication checks or removing it from the plugin’s code
  • Implement a web application firewall rule that blocks unauthenticated POST requests to the 'lockerco_submit_post' endpoint

Generated by OpenCVE AI on April 22, 2026 at 00:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000


Thu, 27 Nov 2025 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 25 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Locker Content plugin for WordPress is vulnerable to Sensitive Information Exposure in version 1.0.0 via the 'lockerco_submit_post' AJAX endpoint. This makes it possible for unauthenticated attackers to extract content from posts that has been protected by the plugin.
Title Locker Content <= 1.0.0 - Unauthenticated Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:27.297Z

Reserved: 2025-10-30T16:42:04.778Z

Link: CVE-2025-12525

cve-icon Vulnrichment

Updated: 2025-11-25T14:54:45.701Z

cve-icon NVD

Status : Deferred

Published: 2025-11-25T08:15:48.493

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12525

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:30:04Z

Weaknesses