Description
The WP STAGING Pro WordPress Backup Plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 6.1.2 due to missing capability checks on the getOutdatedPluginsRequest() function. This makes it possible for unauthenticated attackers to reveal outdated installed active or inactive plugins.
Published: 2025-04-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Exposure
Action: Apply Patch
AI Analysis

Impact

The WP STAGING Pro WordPress Backup Plugin contains a flaw where the getOutdatedPluginsRequest() function lacks a capability check, allowing anyone without authentication to invoke it. This results in an information disclosure that reveals the list of active and inactive plugins and their versions on the site. The primary impact is the accidental exposure of potentially sensitive plugin details, which could be used for reconnaissance but does not facilitate code execution or other direct attacks.

Affected Systems

All WordPress installations that have the WP STAGING Pro plugin installed with a version number up to and including 6.1.2 are affected. The vulnerability applies regardless of the number or type of plugins present on the site; every instance of the plugin in those versions is susceptible. Sites running newer versions of the plugin are not impacted.

Risk and Exploitability

The CVSS score of 5.3 places this flaw in the moderate severity range, while the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector is an unauthenticated HTTP request to the getOutdatedPluginsRequest endpoint. Due to the missing capability check, an attacker can simply send a request to the relevant endpoint, such as /wp-admin/admin-ajax.php?action=getOutdatedPluginsRequest, from any external network to retrieve plugin information. No special privileges are required, making the attack vector straightforward for unauthenticated users.

Generated by OpenCVE AI on April 22, 2026 at 04:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP STAGING Pro to version 6.1.3 or later to include the missing capability checks.
  • Restrict access to the plugin’s admin interface so that only users with appropriate permissions can perform plugin management tasks.
  • Disable or block unauthenticated requests to the getOutdatedPluginsRequest endpoint by configuring the web server or adding network-level rules.

Generated by OpenCVE AI on April 22, 2026 at 04:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-11468 The WP STAGING Pro WordPress Backup Plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 6.1.2 due to missing capability checks on the getOutdatedPluginsRequest() function. This makes it possible for unauthenticated attackers to reveal outdated installed active or inactive plugins.
History

Wed, 16 Apr 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Apr 2025 08:30:00 +0000

Type Values Removed Values Added
Description The WP STAGING Pro WordPress Backup Plugin for WordPress is vulnerable to Information Exposure in all versions up to and including 6.1.2 due to missing capability checks on the getOutdatedPluginsRequest() function. This makes it possible for unauthenticated attackers to reveal outdated installed active or inactive plugins.
Title WP Staging Pro <= 6.1.2 - Unauthenticated Information Exposure via getOutdatedPluginsRequest Function
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:18.717Z

Reserved: 2025-04-01T21:47:26.857Z

Link: CVE-2025-3104

cve-icon Vulnrichment

Updated: 2025-04-16T14:12:52.590Z

cve-icon NVD

Status : Deferred

Published: 2025-04-16T09:15:28.030

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3104

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T04:15:07Z

Weaknesses