Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPBean Our Team Members our-team-members.This issue affects Our Team Members: from n/a through <= 2.2.
Published: 2025-04-01
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vendor WPBean’s Our Team Members plugin contains a vulnerability that allows an attacker to read sensitive system information that should be hidden from unauthorized users. The flaw is classified as a Sensitive Data Exposure (CWE‑497) and can lead to compromise of confidential information if the data is not properly protected. The impact is primarily on confidentiality, with no known impact on integrity or availability.

Affected Systems

The affected product is the WordPress plugin Our Team Members by WPBean. Versions up to and including 2.2 are vulnerable. Any site that has not upgraded beyond 2.2 and is running this plugin is potentially exposed.

Risk and Exploitability

The CVSS base score for this vulnerability is 4.3, indicating moderate risk, and the EPSS score is less than 1%, suggesting a low probability of exploitation. The vulnerability is not yet listed in the CISA KEV catalog. While the description does not specify an exact attack vector, the most plausible scenario involves sending a request to a plugin–specific endpoint that reveals internal server details. Since the plugin runs within a WordPress installation, remote unauthenticated users may be able to trigger the exposed data without additional privileges.

Generated by OpenCVE AI on May 1, 2026 at 02:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest version of the Our Team Members plugin, ensuring the version is greater than 2.2.
  • If the plugin cannot be upgraded, review the configuration options and disable any features that expose sensitive data, such as debug endpoints or raw information outputs.
  • Monitor the web server logs for unexpected requests to plugin URLs and audit any data access that appears abnormal.

Generated by OpenCVE AI on May 1, 2026 at 02:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9094 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPBean Our Team Members. This issue affects Our Team Members: from n/a through 2.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPBean Our Team Members. This issue affects Our Team Members: from n/a through 2.2. Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPBean Our Team Members our-team-members.This issue affects Our Team Members: from n/a through <= 2.2.
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Tue, 01 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Apr 2025 05:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPBean Our Team Members. This issue affects Our Team Members: from n/a through 2.2.
Title WordPress Our Team Members plugin <= 2.2 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:57.683Z

Reserved: 2025-03-26T09:20:18.315Z

Link: CVE-2025-30802

cve-icon Vulnrichment

Updated: 2025-04-01T16:16:54.326Z

cve-icon NVD

Status : Deferred

Published: 2025-04-01T06:15:51.880

Modified: 2026-04-23T15:27:05.950

Link: CVE-2025-30802

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T02:45:06Z

Weaknesses