Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 29 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wpwebelite
Wpwebelite follow My Blog Post |
|
| CPEs | cpe:2.3:a:wpwebelite:follow_my_blog_post:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Wpwebelite
Wpwebelite follow My Blog Post |
Tue, 20 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 19 Dec 2025 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Thu, 18 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in wpweb Follow My Blog Post follow-my-blog-post allows Retrieve Embedded Sensitive Data.This issue affects Follow My Blog Post: from n/a through <= 2.3.9. | |
| Title | WordPress Follow My Blog Post plugin <= 2.3.9 - Sensitive Data Exposure vulnerability | |
| Weaknesses | CWE-497 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-01-20T14:28:21.008Z
Reserved: 2025-10-29T03:08:22.608Z
Link: CVE-2025-64258
Updated: 2025-12-18T20:36:08.624Z
Status : Analyzed
Published: 2025-12-18T08:16:12.927
Modified: 2026-01-29T19:04:20.920
Link: CVE-2025-64258
No data.
OpenCVE Enrichment
Updated: 2025-12-19T09:17:30Z