Description
The Tainacan plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via uploaded files marked as private being exposed in wp-content without adequate protection. This makes it possible for unauthenticated attackers to extract potentially sensitive information from files that have been marked as private.
Published: 2025-11-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Patch Now
AI Analysis

Impact

The vulnerability allows any unauthenticated user to read private files uploaded by the Tainacan WordPress plugin, because those files are stored in wp‑content without proper protection. The flaw is a direct information exposure that could reveal sensitive documents or data to unintended parties. This defect stems from an improper restriction of access to private resources, as identified by CWE‑552.

Affected Systems

Affected systems are installations of the Tainacan plugin for WordPress, specifically all versions up to and including 1.0.0. WordPress sites that have deployed these versions and have private files uploaded via Tainacan may have exposed confidential data.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity, while the EPSS score of <1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation would likely involve the attacker simply requesting the location of a private file in the wp‑content directory, a path that is directly accessible because the plugin fails to enforce authentication checks. Therefore the threat is primarily limited to accidental or opportunistic disclosure, though the potential impact could still be significant if sensitive files are compromised.

Generated by OpenCVE AI on April 21, 2026 at 01:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Tainacan plugin to version 1.0.1 or later to apply the vendor patch.
  • Configure WordPress to restrict HTTP access to the wp‑content directory that holds private files, for example by moving them outside the web root or by applying .htaccess rules to deny direct requests.
  • Remove or relocate any pre‑existing private files that remain in wp‑content, and set appropriate file permissions to prevent unauthenticated access.

Generated by OpenCVE AI on April 21, 2026 at 01:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tainacan
Tainacan tainacan
Wordpress
Wordpress wordpress
Vendors & Products Tainacan
Tainacan tainacan
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 21 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
Description The Tainacan plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.0.0 via uploaded files marked as private being exposed in wp-content without adequate protection. This makes it possible for unauthenticated attackers to extract potentially sensitive information from files that have been marked as private.
Title Tainacan <= 1.0.0 - Unauthenticated Information Exposure
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Tainacan Tainacan
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:09.919Z

Reserved: 2025-11-05T14:49:36.149Z

Link: CVE-2025-12747

cve-icon Vulnrichment

Updated: 2025-11-21T16:40:21.810Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T17:15:50.053

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12747

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:30:24Z

Weaknesses