Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in opicron Image Cleanup image-cleanup allows Retrieve Embedded Sensitive Data.This issue affects Image Cleanup: from n/a through <= 1.9.2.
Published: 2025-12-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Image Cleanup WordPress plugin contains a flaw that lets an attacker retrieve sensitive system information embedded in the plugin’s files, allowing the exposure of configuration details, server metadata, or other confidential data to an unauthorized or low‑privilege user. This leads to a compromise of confidentiality, as private data could be disclosed or used for further attacks. The weakness is categorized as CWE‑497, which relates to mishandling of sensitive data.

Affected Systems

The vulnerability affects the Image Cleanup plugin developed by opicron, which is available to WordPress users. All installations of the plugin with a version <= 1.9.2 are impacted; no specific sub‑versions are provided, so any release up to and including 1.9.2 is considered vulnerable.

Risk and Exploitability

The CVSS score is 5.3, indicating a moderate severity. The EPSS score is reported as < 1%, showing a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is inferred as an unprotected plugin endpoint that can be accessed by any user, allowing the retrieval of embedded sensitive data without authentication or with minimal privileges.

Generated by OpenCVE AI on April 29, 2026 at 13:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Image Cleanup plugin to version 1.9.3 or the most recent release, which contains the fix for the data exposure flaw.
  • If an upgrade is not immediately available, deactivate or remove the plugin to prevent unauthenticated access to its resources.
  • Configure the web server or WordPress security settings to block unauthorized access to the plugin’s directories and ensure only privileged users can read files that may contain sensitive information.

Generated by OpenCVE AI on April 29, 2026 at 13:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in opicron Image Cleanup image-cleanup allows Retrieve Embedded Sensitive Data.This issue affects Image Cleanup: from n/a through <= 1.9.2.
Title WordPress Image Cleanup plugin <= 1.9.2 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:55:23.311Z

Reserved: 2025-10-21T14:59:44.293Z

Link: CVE-2025-62737

cve-icon Vulnrichment

Updated: 2025-12-10T21:34:52.735Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:02.483

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62737

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:45:12Z

Weaknesses