Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in wpweb Follow My Blog Post follow-my-blog-post allows Retrieve Embedded Sensitive Data.This issue affects Follow My Blog Post: from n/a through <= 2.3.9.
Published: 2025-12-18
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The following weakness allows an unauthenticated attacker to retrieve sensitive information that is embedded in the WordPress Follow My Blog Post plugin. Because the plugin exposes this data without proper access controls, an attacker could gain confidential knowledge about the site environment, configuration, or user data, thereby compromising confidentiality. This vulnerability is classified as CWE‑497 – Disclosure of Sensitive Information.

Affected Systems

The vulnerability affects the WordPress plugin Follow My Blog Post from vendor wpweb. All installed instances with version 2.3.9 or earlier are affected. No specific patch version is listed, so upgrading beyond 2.3.9 is required to remediate.

Risk and Exploitability

The CVSS score of 7.5 indicates high severity. The EPSS score is less than 1 %, suggesting that exploitation is currently unlikely but still possible in a targeted context. The vulnerability is not included in CISA’s KEV catalog, so no widespread exploitation has been reported. The attack vector is inferred to be a remote web request against the plugin’s exposed endpoints; the attacker does not need privileged access to the server or additional authentication to extract the data.

Generated by OpenCVE AI on April 29, 2026 at 13:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Follow My Blog Post plugin to a version newer than 2.3.9; if an immediate update is not feasible, remove the plugin entirely.
  • Restrict access to the plugin’s directory and any of its API endpoints using web server configuration (e.g., .htaccess rules or firewall rules) to limit exposure to legitimate users only.
  • Deploy a web application firewall rule that blocks or modifies responses containing sensitive data patterns, ensuring that accidental leaks cannot be returned to unauthorized clients.

Generated by OpenCVE AI on April 29, 2026 at 13:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Wpwebelite
Wpwebelite follow My Blog Post
CPEs cpe:2.3:a:wpwebelite:follow_my_blog_post:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpwebelite
Wpwebelite follow My Blog Post

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Fri, 19 Dec 2025 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Thu, 18 Dec 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 18 Dec 2025 07:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in wpweb Follow My Blog Post follow-my-blog-post allows Retrieve Embedded Sensitive Data.This issue affects Follow My Blog Post: from n/a through <= 2.3.9.
Title WordPress Follow My Blog Post plugin <= 2.3.9 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Wordpress Wordpress
Wpwebelite Follow My Blog Post
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:28:06.820Z

Reserved: 2025-10-29T03:08:22.608Z

Link: CVE-2025-64258

cve-icon Vulnrichment

Updated: 2025-12-18T20:36:08.624Z

cve-icon NVD

Status : Analyzed

Published: 2025-12-18T08:16:12.927

Modified: 2026-01-29T19:04:20.920

Link: CVE-2025-64258

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:15:11Z

Weaknesses