Description
The WP Recipe Maker plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 10.2.2 via the api_get_post_summary function due to insufficient restrictions on which posts can be retrieved. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from posts they may not be able to edit or read otherwise. This also affects password protected, private, or draft posts that they should not have access to.
Published: 2026-01-16
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Information Exposure via API
Action: Patch
AI Analysis

Impact

The WP Recipe Maker plugin for WordPress contains an information exposure flaw that allows authenticated users with Contributor level or higher to retrieve summaries of posts through the api_get_post_summary function. This vulnerability permits access to posts that the attacker normally cannot edit or read, including password protected, private, or draft entries. The weakness is a classic case of excessive data disclosure, classified as CWE-200.

Affected Systems

Any WordPress site installing WP Recipe Maker v10.2.2 or earlier is affected. The flaw exists in the plugin’s core API code, regardless of the overall WordPress version, so all sites that rely on this plugin and have users with Contributor or stronger roles are at risk.

Risk and Exploitability

Given the CVSS score of 4.3 and an EPSS score of less than 1%, the vulnerability is considered low to moderate severity and is unlikely to be broadly exploited. However, the impact is significant because an attacker can obtain private recipe data. The likely attack vector is through an authenticated REST API call to wp-json/wprm/v1/get-post-summary, where the attacker supplies a post ID of interest. Access to this endpoint is insufficiently restricted, allowing the extraction of post content. The lack of inclusion in the CISA KEV catalog further indicates that there is no known active weaponized exploitation at this time.

Generated by OpenCVE AI on April 20, 2026 at 15:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP Recipe Maker to the latest stable release (10.2.3 or newer) to remove the vulnerable endpoint.
  • If a plugin upgrade cannot be performed immediately, limit the capabilities of Contributor users so they cannot access REST API endpoints, for example by using a role‑management plugin to remove read permissions for the wprm_rest_api routes.
  • As a short‑term workaround, block direct access to wp-json/wprm/v1/get-post-summary by adding a rule to the server configuration or .htaccess that denies the endpoint for logged‑in users with only Contributor privileges or less.

Generated by OpenCVE AI on April 20, 2026 at 15:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
References

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 05:00:00 +0000

Type Values Removed Values Added
Description The WP Recipe Maker plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 10.2.2 via the api_get_post_summary function due to insufficient restrictions on which posts can be retrieved. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from posts they may not be able to edit or read otherwise. This also affects password protected, private, or draft posts that they should not have access to.
Title WP Recipe Maker <= 10.2.2 - Insecure Direct Object Reference to Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-14T15:30:23.549Z

Reserved: 2026-01-15T16:43:32.875Z

Link: CVE-2025-15527

cve-icon Vulnrichment

Updated: 2026-01-16T14:02:54.780Z

cve-icon NVD

Status : Deferred

Published: 2026-01-16T05:16:13.517

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-15527

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:00:10Z

Weaknesses