Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze squeeze allows Retrieve Embedded Sensitive Data.This issue affects Squeeze: from n/a through <= 1.6.
Published: 2025-04-09
Score: 2.7 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows an unauthenticated or potentially authenticated user to obtain the full file path of sensitive system files via the Bogdan Bendziukov Squeeze WordPress plugin. The exposed information can aid an attacker in enumerating directory structures and identifying configuration files that may contain further exploitable details. The weakness aligns with CWE-497, which describes excessive or out‑of‑range access to system data.

Affected Systems

The affected product is Bogdan Bendziukov’s Squeeze WordPress plugin, versions from the first release through version 1.6.

Risk and Exploitability

With a CVSS score of 2.7 the severity is low, and the EPSS score indicates a very low probability of exploitation. The vulnerability is not listed in CISA's KEV catalog, suggesting no known widespread exploitation. The likely attack vector is via the WordPress administrative interface where the plugin resides, requiring at least read access to the plugin’s configuration files. Abuse of this path disclosure can assist attackers in planning subsequent attacks but does not directly compromise the system itself.

Generated by OpenCVE AI on April 30, 2026 at 23:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Squeeze to a version newer than 1.6 to eliminate the path disclosure flaw.
  • If an upgrade is not yet possible, disable the Squeeze plugin or restrict its admin pages to trusted users only.
  • Review server configuration to ensure that PHP and web server logs reveal no absolute paths and consider moving the WordPress installation outside the web root if appropriate.

Generated by OpenCVE AI on April 30, 2026 at 23:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10664 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze allows Retrieve Embedded Sensitive Data. This issue affects Squeeze: from n/a through 1.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze allows Retrieve Embedded Sensitive Data. This issue affects Squeeze: from n/a through 1.6. Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze squeeze allows Retrieve Embedded Sensitive Data.This issue affects Squeeze: from n/a through <= 1.6.
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze allows Retrieve Embedded Sensitive Data. This issue affects Squeeze: from n/a through 1.6.
Title WordPress Squeeze plugin <= 1.6 - Full Path Disclosure (FPD) vulnerability
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 2.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:03.354Z

Reserved: 2025-03-26T09:22:56.080Z

Link: CVE-2025-31003

cve-icon Vulnrichment

Updated: 2025-04-09T17:52:39.944Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:32.817

Modified: 2026-04-23T15:27:30.810

Link: CVE-2025-31003

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T23:45:03Z

Weaknesses