Description
Insertion of Sensitive Information Into Sent Data vulnerability in Razvan Stanga Varnish/Nginx Proxy Caching vcaching allows Retrieve Embedded Sensitive Data.This issue affects Varnish/Nginx Proxy Caching: from n/a through <= 1.8.3.
Published: 2025-12-31
Score: 5.3 Medium
EPSS: 3.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WordPress Varnish/Nginx Proxy Caching plugin up to version 1.8.3 contains an insertion of sensitive information into sent data flaw. An attacker can retrieve embedded sensitive data through this vulnerability, exposing information that should remain confidential. The weakness is identified as CWE‑201, a data exposure issue.

Affected Systems

Affected systems are installations of the Razvan Stanga Varnish/Nginx Proxy Caching plugin for WordPress, specifically any version from the earliest available through 1.8.3 inclusive.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of 3% suggests a low but non‑negligible probability of exploitation. The issue is not listed in CISA KEV, implying no widespread known exploitation. Likely exploitation requires that the plugin be activated and that the application or user context enables the plugin’s caching mechanism. The vendor’s documentation does not specify preconditions, so the likely attack vector is through the plugin’s normal operation on a WordPress site.

Generated by OpenCVE AI on April 29, 2026 at 17:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Varnish/Nginx Proxy Caching plugin to a version newer than 1.8.3
  • If updating immediately is not feasible, disable or remove the plugin from the WordPress installation
  • Implement monitoring for anomalous data exposure patterns at the WordPress and server levels

Generated by OpenCVE AI on April 29, 2026 at 17:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Razvan Stanga Varnish/Nginx Proxy Caching allows Retrieve Embedded Sensitive Data.This issue affects Varnish/Nginx Proxy Caching: from n/a through 1.8.3. Insertion of Sensitive Information Into Sent Data vulnerability in Razvan Stanga Varnish/Nginx Proxy Caching vcaching allows Retrieve Embedded Sensitive Data.This issue affects Varnish/Nginx Proxy Caching: from n/a through <= 1.8.3.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Razvan Stanga
Razvan Stanga varnish Nginx Proxy Caching Plugin
Wordpress
Wordpress wordpress
Vendors & Products Razvan Stanga
Razvan Stanga varnish Nginx Proxy Caching Plugin
Wordpress
Wordpress wordpress

Wed, 31 Dec 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 31 Dec 2025 15:45:00 +0000

Type Values Removed Values Added
Description Insertion of Sensitive Information Into Sent Data vulnerability in Razvan Stanga Varnish/Nginx Proxy Caching allows Retrieve Embedded Sensitive Data.This issue affects Varnish/Nginx Proxy Caching: from n/a through 1.8.3.
Title WordPress Varnish/Nginx Proxy Caching plugin <= 1.8.3 - Sensitive Data Exposure vulnerability
Weaknesses CWE-201
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Razvan Stanga Varnish Nginx Proxy Caching Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:02.313Z

Reserved: 2025-10-07T15:41:41.480Z

Link: CVE-2025-62126

cve-icon Vulnrichment

Updated: 2025-12-31T16:51:10.653Z

cve-icon NVD

Status : Deferred

Published: 2025-12-31T16:15:45.163

Modified: 2026-04-23T15:34:35.440

Link: CVE-2025-62126

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T18:00:13Z

Weaknesses