Description
Insertion of Sensitive Information Into Sent Data vulnerability in AA Web Servant 12 Step Meeting List 12-step-meeting-list allows Retrieve Embedded Sensitive Data.This issue affects 12 Step Meeting List: from n/a through <= 3.16.5.
Published: 2025-01-24
Score: 5.3 Medium
EPSS: 6.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability in the AA Web Servant 12 Step Meeting List plugin allows the insertion of sensitive information into data that is sent to the client, enabling an attacker to retrieve embedded confidential content. This flaw corresponds to CWE‑201 and permits a confidentiality breach by exposing sensitive data that should not be publicly transmitted.

Affected Systems

WordPress sites that use the AA Web Servant 12 Step Meeting List plugin, versions up to and including 3.16.5, are affected. The impact is limited to environments where the plugin is installed and active.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity for this defect, and the EPSS score of 6% suggests a moderately low probability of exploitation in the near term. It is not currently listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker who can trigger the plugin’s data retrieval functionality—potentially via a crafted request—can obtain sensitive data. No specific authentication or privilege requirements are mentioned, implying that the risk may be exploitable by unauthenticated users or those with normal access to the plugin’s endpoints. The overall risk is moderate, highlighting the need to address the vulnerability promptly.

Generated by OpenCVE AI on May 2, 2026 at 05:30 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the 12 Step Meeting List plugin to version 3.16.6 or later.
  • If immediate patch is unavailable, disable the plugin’s sensitive data retrieval feature through configuration or custom code modifications to prevent exposure.
  • Restrict or block access to the affected endpoints using a web application firewall or .htaccess rules until the patch is applied.

Generated by OpenCVE AI on May 2, 2026 at 05:30 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-3788 Insertion of Sensitive Information Into Sent Data vulnerability in Code for Recovery 12 Step Meeting List allows Retrieve Embedded Sensitive Data. This issue affects 12 Step Meeting List: from n/a through 3.16.5.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Code for Recovery 12 Step Meeting List allows Retrieve Embedded Sensitive Data. This issue affects 12 Step Meeting List: from n/a through 3.16.5. Insertion of Sensitive Information Into Sent Data vulnerability in AA Web Servant 12 Step Meeting List 12-step-meeting-list allows Retrieve Embedded Sensitive Data.This issue affects 12 Step Meeting List: from n/a through <= 3.16.5.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Fri, 24 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 24 Jan 2025 17:30:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Code for Recovery 12 Step Meeting List allows Retrieve Embedded Sensitive Data. This issue affects 12 Step Meeting List: from n/a through 3.16.5.
Title WordPress 12 Step Meeting List plugin <= 3.16.5 - Sensitive Data Exposure vulnerability
Weaknesses CWE-201
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:29.021Z

Reserved: 2025-01-23T14:50:41.361Z

Link: CVE-2025-24582

cve-icon Vulnrichment

Updated: 2025-01-24T18:47:39.258Z

cve-icon NVD

Status : Deferred

Published: 2025-01-24T18:15:35.397

Modified: 2026-04-23T15:25:03.513

Link: CVE-2025-24582

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T05:30:26Z

Weaknesses