Description
The Comment Edit Core – Simple Comment Editing plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.0 via the 'ajax_get_comment' function. This makes it possible for unauthenticated attackers to extract sensitive data including user IDs, IP addresses, and email addresses.
Published: 2025-11-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure
Action: Immediate Patch
AI Analysis

Impact

The WordPress plugin ‘Comment Edit Core – Simple Comment Editing’ is affected by a CVE that allows unauthenticated attackers to retrieve sensitive user details through the ajax_get_comment function. The vulnerability directly exposes user identifiers, IP addresses, and email addresses, compromising confidentiality as defined by CWE‑200. Given the design of the plugin, an attacker gains no denial‑of‑service or code execution capability, but the disclosure of personal data can enable further targeted attacks such as phishing or credential harvesting.

Affected Systems

All installations of the WordPress plugin ‘Comment Edit Core – Simple Comment Editing’ running version 3.1.0 or earlier are impacted. The affected product is provided by the vendor ronalfy and is deployed via the WordPress plugin infrastructure. In practice, any WordPress site enabled with this plugin without an updated version will be exposed.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity vulnerability, and the EPSS score of <1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog, further supporting the assessment that exploitation is unlikely to be seen in the wild. Attackers can trigger the flaw by issuing a simple Ajax request to the ajax_get_comment endpoint with no authentication; learning the user ID or email does not require additional privileges, meaning the attack vector is unauthenticated and easily automatable.

Generated by OpenCVE AI on April 22, 2026 at 00:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Comment Edit Core – Simple Comment Editing plugin to version 3.1.1 or later if available. If a newer version is not yet released, consider disabling or blocking unauthenticated access to the ajax_get_comment endpoint by configuring the web server or a firewall to require authentication for all Ajax requests. Apply a site‑wide access control rule that limits the use of the plugin’s Ajax functionality to logged‑in administrators or users with explicit permissions.
  • Restrict comment editing capabilities to administrators only by adjusting the plugin’s role settings, ensuring regular users cannot trigger the ajax_get_comment function.
  • Configure a web‑application firewall or security plugin to filter and block unauthenticated Ajax requests to the plugin’s endpoint for any non‑admin user, adding an extra layer of protection if the patch is delayed.

Generated by OpenCVE AI on April 22, 2026 at 00:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 14 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 13 Nov 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 13 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Comment Edit Core – Simple Comment Editing plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.1.0 via the 'ajax_get_comment' function. This makes it possible for unauthenticated attackers to extract sensitive data including user IDs, IP addresses, and email addresses.
Title Comment Edit Core – Simple Comment Editing <= 3.1.0 - Unauthenticated Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:52:06.099Z

Reserved: 2025-11-04T00:25:24.942Z

Link: CVE-2025-12681

cve-icon Vulnrichment

Updated: 2025-11-14T16:48:34.446Z

cve-icon NVD

Status : Deferred

Published: 2025-11-13T08:15:48.260

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12681

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:45:04Z

Weaknesses