Description
Insertion of Sensitive Information Into Sent Data vulnerability in Saad Iqbal AppExperts appexperts allows Retrieve Embedded Sensitive Data.This issue affects AppExperts: from n/a through <= 1.4.5.
Published: 2025-10-22
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The AppExperts plugin for WordPress contains an insertion of sensitive information into data that is sent to users, allowing the retrieval of embedded confidential data. This flaw permits an attacker to access data that should remain private, compromising the confidentiality of any sensitive information stored or transmitted by the plugin. The weakness corresponds to CWE‑201, a classic sensitive data exposure scenario.

Affected Systems

The Vulnerability affects the Saad Iqbal:AppExperts plugin in all releases up to and including version 1.4.5. WordPress sites that have installed any of these plugin versions are at risk. No later versions are mentioned, implying that fixes may be available in releases beyond 1.4.5.

Risk and Exploitability

The CVSS score of 5.8 indicates a medium severity condition. The EPSS score of less than 1% suggests that widespread exploitation is unlikely at present. The vulnerability is not listed in the CISA KEV catalog, and there is no indication of an active exploit. Based on the description, it is inferred that the plugin can be reached through the WordPress web interface, so the likely attack vector is via web-based input or request manipulation, enabling unauthorized disclosure of data when it is transmitted to the client.

Generated by OpenCVE AI on April 30, 2026 at 14:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the AppExperts plugin to the latest available version (which should be greater than 1.4.5) to eliminate the flaw.
  • If an update is not immediately available, disable the AppExperts plugin or remove it from the site until the vendor releases a patched version.
  • Review any sensitive data exposed through the plugin’s configuration or output and ensure it is removed or adequately protected before a patch is applied.

Generated by OpenCVE AI on April 30, 2026 at 14:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}


Thu, 23 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Saad Iqbal AppExperts appexperts allows Retrieve Embedded Sensitive Data.This issue affects AppExperts: from n/a through <= 1.4.5.
Title WordPress AppExperts plugin <= 1.4.5 - Sensitive Data Exposure vulnerability
Weaknesses CWE-201
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:51:55.525Z

Reserved: 2025-06-27T10:27:53.889Z

Link: CVE-2025-53218

cve-icon Vulnrichment

Updated: 2025-10-23T14:00:03.581Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:15:48.020

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-53218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:00:14Z

Weaknesses