Description
Insertion of Sensitive Information Into Sent Data vulnerability in Blockspare Blockspare blockspare allows Retrieve Embedded Sensitive Data.This issue affects Blockspare: from n/a through <= 3.2.13.2.
Published: 2025-10-22
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Insertion of Sensitive Information Into Sent Data in the Blockspare plugin allows an attacker to retrieve embedded sensitive data that should not be transmitted. This vulnerability could expose credentials, personal information, or other confidential data that the plugin includes in its output, leading to confidentiality compromise. The weakness is classified as CWE‑201, indicating a failure to protect or conceal sensitive data.

Affected Systems

WordPress sites that have the Blockspare plugin (CNA vendor Blockspare) installed at any version up to and including 3.2.13.2 are affected. The vulnerability applies to all releases of the plugin from its initial version through 3.2.13.2. Therefore, any WordPress installation using the Blockspare blockspare plugin in these versions may expose sensitive data.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity, primarily affecting confidentiality. The EPSS score of less than 1% suggests a low likelihood of exploitation, and the vulnerability is not listed in the CISA KEV catalog, implying limited known usage by threat actors. Likely, the attack vector involves any user who can trigger the Blockspare output, such as an unauthenticated visitor or local user, forcing the plugin to render data that includes hidden sensitive values. An attacker could then capture the response and extract the embedded credentials or personal information. The limited exploitation probability reduces urgency, but the confidentiality impact warrants a timely patch.

Generated by OpenCVE AI on April 29, 2026 at 16:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Blockspare to a version newer than 3.2.13.2.
  • If an upgrade cannot be performed, disable or remove the Blockspare plugin to eliminate the data exposure path.
  • Implement a web application firewall rule to block responses containing sensitive data patterns or restrict access to the plugin’s endpoints.

Generated by OpenCVE AI on April 29, 2026 at 16:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Blockspare
Blockspare blockspare
Wordpress
Wordpress wordpress
Vendors & Products Blockspare
Blockspare blockspare
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Blockspare Blockspare blockspare allows Retrieve Embedded Sensitive Data.This issue affects Blockspare: from n/a through <= 3.2.13.2.
Title WordPress Blockspare plugin <= 3.2.13.2 - Sensitive Data Exposure vulnerability
Weaknesses CWE-201
References

Subscriptions

Blockspare Blockspare
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:48:28.533Z

Reserved: 2025-10-07T15:34:20.406Z

Link: CVE-2025-62026

cve-icon Vulnrichment

Updated: 2025-10-23T15:10:54.765Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:16:04.037

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62026

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:30:15Z

Weaknesses