Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Joel User Spam Remover user-spam-remover allows Retrieve Embedded Sensitive Data.This issue affects User Spam Remover: from n/a through <= 1.1.
Published: 2025-12-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability allows an attacker to retrieve sensitive data embedded within the User Spam Remover plugin. The description does not specify the types of data exposed, only that sensitive information can be retrieved without authorization. This is a failure to properly protect sensitive information and is designated as CWE-497. Loss of confidentiality may result, but the exact impact depends on what data the plugin stores.

Affected Systems

The User Spam Remover plugin distributed by Joel is affected in all releases from n/a through version 1.1. WordPress sites that have installed these versions of the plugin are at risk of exposing sensitive data.

Risk and Exploitability

Based on the description stating that the issue allows unauthorized retrieval of embedded data, the likely attack vector involves accessing the plugin’s data endpoints or its administrative interface, which may be reachable if authentication checks are inadequate. The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% indicates a low probability of exploitation. The vulnerability is not included in CISA’s KEV catalog.

Generated by OpenCVE AI on April 29, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade User Spam Remover to a version newer than 1.1 if an update is available.
  • If no newer version exists, uninstall or disable the plugin entirely to eliminate the exposed data channel.
  • As an interim measure, restrict access to the plugin’s administrative pages by enforcing role‑based access controls or IP whitelisting so that only trusted administrators can reach the data endpoints.

Generated by OpenCVE AI on April 29, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Joelhardi
Joelhardi user Spam Remover
Wordpress
Wordpress wordpress
Vendors & Products Joelhardi
Joelhardi user Spam Remover
Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Joel User Spam Remover user-spam-remover allows Retrieve Embedded Sensitive Data.This issue affects User Spam Remover: from n/a through <= 1.1.
Title WordPress User Spam Remover plugin <= 1.1 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Joelhardi User Spam Remover
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:55:02.245Z

Reserved: 2025-10-21T14:59:44.293Z

Link: CVE-2025-62735

cve-icon Vulnrichment

Updated: 2025-12-10T21:35:38.905Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:02.223

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62735

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T19:30:18Z

Weaknesses