Description
Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetMenu jet-menu allows Retrieve Embedded Sensitive Data.This issue affects JetMenu: from n/a through <= 2.4.11.1.
Published: 2025-08-20
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The JetMenu plugin for WordPress contains a flaw that permits sensitive information to be inserted into and subsequently exposed through data transmissions. This vulnerability, classified as CWE‑201, allows an attacker to retrieve confidential fields such as credentials or tokens that should remain hidden, potentially compromising the integrity and confidentiality of the site’s data.

Affected Systems

Any WordPress installation using Crocoblock JetMenu version 2.4.11.1 or earlier is affected. The plugin’s support for all earlier releases means that any site that has not upgraded to 2.4.12 or later exposes itself to this flaw.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate severity, while the EPSS score of less than 1 percent shows that exploitation is unlikely but possible. The vulnerability is not listed in CISA’s KEV catalog. Attackers would most likely exploit the flaw by accessing plugin‑rendered pages or by sending crafted requests to endpoints that cause JetMenu to output unfiltered data. No publicly known exploit code is available at this time, but the potential for accidental leakage remains.

Generated by OpenCVE AI on April 30, 2026 at 08:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the JetMenu plugin to the latest release, which is version 2.4.12 or later, to eliminate the data‑exposure flaw.
  • If an immediate update cannot be performed, disable or uninstall the JetMenu plugin to prevent the vulnerable functionality from operating.
  • After patching or disabling, review site logs and output pages for any residual sensitive data exposure and enforce strict role‑based access controls to protect administrative interfaces.

Generated by OpenCVE AI on April 30, 2026 at 08:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-25318 Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetMenu allows Retrieve Embedded Sensitive Data. This issue affects JetMenu: from n/a through 2.4.11.1.
History

Wed, 29 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetMenu allows Retrieve Embedded Sensitive Data. This issue affects JetMenu: from n/a through 2.4.11.1. Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetMenu jet-menu allows Retrieve Embedded Sensitive Data.This issue affects JetMenu: from n/a through <= 2.4.11.1.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Sun, 24 Aug 2025 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Crocoblock
Crocoblock jetelements
Wordpress
Wordpress wordpress
Vendors & Products Crocoblock
Crocoblock jetelements
Wordpress
Wordpress wordpress

Wed, 20 Aug 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetMenu allows Retrieve Embedded Sensitive Data. This issue affects JetMenu: from n/a through 2.4.11.1.
Title WordPress JetMenu <= 2.4.11.1 - Sensitive Data Exposure Vulnerability
Weaknesses CWE-201
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Crocoblock Jetelements
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-29T09:51:55.657Z

Reserved: 2025-07-16T08:51:03.831Z

Link: CVE-2025-53987

cve-icon Vulnrichment

Updated: 2025-08-20T14:39:38.950Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:44.110

Modified: 2026-04-29T10:16:50.140

Link: CVE-2025-53987

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:45:16Z

Weaknesses