Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList stafflist allows Retrieve Embedded Sensitive Data.This issue affects StaffList: from n/a through <= 3.2.7.
Published: 2025-04-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability in the ERA404 StaffList WordPress plugin allows an attacker to retrieve sensitive embedded data, disclosing system information that should be restricted to authorized users. The primary impact is a confidentiality breach, enabling unauthorized users to access confidential data stored within the WordPress site.

Affected Systems

The affected product is the ERA404 StaffList WordPress plugin, specifically versions up to and including 3.2.7. Any WordPress installation that has this plugin at a vulnerable version is at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity vulnerability. The EPSS score of less than 1% indicates a low likelihood of exploitation, and the vulnerability is not listed in CISA KEV. Based on the description, the likely attack vector is through a web-based interface that allows users to access or interact with the plugin. An attacker with access to the plugin administrative interface could trigger the data retrieval, exposing valuable information.

Generated by OpenCVE AI on May 1, 2026 at 00:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the StaffList plugin to the latest released version (3.2.8 or newer).
  • If an update is unavailable, disable or uninstall the plugin to prevent data exposure.
  • Restrict administrative access to the plugin’s settings pages via role-based permissions or a web application firewall.

Generated by OpenCVE AI on May 1, 2026 at 00:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-9792 Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList allows Retrieve Embedded Sensitive Data. This issue affects StaffList: from n/a through 3.2.6.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList allows Retrieve Embedded Sensitive Data. This issue affects StaffList: from n/a through 3.2.6. Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList stafflist allows Retrieve Embedded Sensitive Data.This issue affects StaffList: from n/a through <= 3.2.7.
Title WordPress StaffList plugin <= 3.2.6 - Sensitive Data Exposure vulnerability WordPress StaffList plugin <= 3.2.7 - Sensitive Data Exposure vulnerability
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Fri, 04 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 04 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in ERA404 StaffList allows Retrieve Embedded Sensitive Data. This issue affects StaffList: from n/a through 3.2.6.
Title WordPress StaffList plugin <= 3.2.6 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Era404 Stafflist
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:19.945Z

Reserved: 2025-04-04T10:02:14.481Z

Link: CVE-2025-32255

cve-icon Vulnrichment

Updated: 2025-04-04T18:55:51.681Z

cve-icon NVD

Status : Deferred

Published: 2025-04-04T16:15:35.047

Modified: 2026-04-23T15:28:50.793

Link: CVE-2025-32255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T00:30:04Z

Weaknesses