Description
Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetEngine jet-engine allows Retrieve Embedded Sensitive Data.This issue affects JetEngine: from n/a through <= 3.7.0.
Published: 2025-08-20
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability, identified as an Insertion of Sensitive Information Into Sent Data, allows the JetEngine plugin to deliver embedded sensitive data to unauthorized parties. This flaw, classified as CWE‑201, enables attackers to gain access to confidential information that should not be publicly exposed.

Affected Systems

The affected product is Crocoblock’s JetEngine plugin for WordPress. Versions from the earliest available through 3.7.0 are impacted. The issue does not affect later releases such as 3.7.1 and above.

Risk and Exploitability

The CVSS score of 6.5 categorizes this as a medium‑severity weakness. The EPSS score indicates an exploitation probability of less than 1 %, suggesting that while the flaw is moderate, it is unlikely to be widely exploited. The vulnerability is not listed in the CISA KEV catalog. Because the description does not specify an exact attack vector, the likely vector is a remote web‑based request that triggers the plugin to send sensitive data to the requester. No privilege escalation or code execution is required; the risk is confined to unauthorized disclosure of protected information.

Generated by OpenCVE AI on April 30, 2026 at 08:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update JetEngine to a version newer than 3.7.0 whenever a patch becomes available.
  • If an immediate update is not feasible, deactivate the JetEngine plugin until the vulnerability is resolved to prevent further data exposure.
  • Verify that none of the plugin’s endpoints or configuration settings are transmitting sensitive data to external parties after the update or deactivation.

Generated by OpenCVE AI on April 30, 2026 at 08:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25364 Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetEngine allows Retrieve Embedded Sensitive Data. This issue affects JetEngine: from n/a through 3.7.0.
History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetEngine allows Retrieve Embedded Sensitive Data. This issue affects JetEngine: from n/a through 3.7.0. Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetEngine jet-engine allows Retrieve Embedded Sensitive Data.This issue affects JetEngine: from n/a through <= 3.7.0.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 21 Aug 2025 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Crocoblock
Crocoblock jetengine
Wordpress
Wordpress wordpress
Vendors & Products Crocoblock
Crocoblock jetengine
Wordpress
Wordpress wordpress

Wed, 20 Aug 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetEngine allows Retrieve Embedded Sensitive Data. This issue affects JetEngine: from n/a through 3.7.0.
Title WordPress JetEngine <= 3.7.0 - Sensitive Data Exposure Vulnerability
Weaknesses CWE-201
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Crocoblock Jetengine
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:51:56.722Z

Reserved: 2025-06-27T10:27:33.251Z

Link: CVE-2025-53196

cve-icon Vulnrichment

Updated: 2025-08-20T17:51:36.236Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:39.737

Modified: 2026-04-29T10:16:49.257

Link: CVE-2025-53196

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:45:16Z

Weaknesses