Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 12 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Fri, 12 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 12 Dec 2025 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to sensitive information exposure due to storage of exported CSV files in a publicly accessible directory with predictable filenames in all versions up to, and including, 4.9.2. This makes it possible for unauthenticated attackers to access sensitive user data including emails, IP addresses, usernames, roles, and location data by directly accessing the exported CSV file. | |
| Title | Secure Copy Content Protection and Content Locking <= 4.9.2 - Unauthenticated Sensitive Information Exposure via Exposed CSV Export File | |
| Weaknesses | CWE-552 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-12T15:31:40.218Z
Reserved: 2025-12-10T13:08:38.289Z
Link: CVE-2025-14442
Updated: 2025-12-12T14:42:16.421Z
Status : Awaiting Analysis
Published: 2025-12-12T12:15:46.377
Modified: 2025-12-12T15:17:31.973
Link: CVE-2025-14442
No data.
OpenCVE Enrichment
No data.