Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 20 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 10 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Joelhardi
Joelhardi user Spam Remover Wordpress Wordpress wordpress |
|
| Vendors & Products |
Joelhardi
Joelhardi user Spam Remover Wordpress Wordpress wordpress |
Tue, 09 Dec 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Joel User Spam Remover user-spam-remover allows Retrieve Embedded Sensitive Data.This issue affects User Spam Remover: from n/a through <= 1.1. | |
| Title | WordPress User Spam Remover plugin <= 1.1 - Sensitive Data Exposure vulnerability | |
| Weaknesses | CWE-497 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-01-20T14:28:15.525Z
Reserved: 2025-10-21T14:59:44.293Z
Link: CVE-2025-62735
Updated: 2025-12-10T21:35:38.905Z
Status : Awaiting Analysis
Published: 2025-12-09T16:18:02.223
Modified: 2026-01-20T15:17:56.510
Link: CVE-2025-62735
No data.
OpenCVE Enrichment
Updated: 2025-12-10T17:50:21Z