Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in 10up Eight Day Week Print Workflow eight-day-week-print-workflow allows Retrieve Embedded Sensitive Data.This issue affects Eight Day Week Print Workflow: from n/a through <= 1.2.5.
Published: 2025-12-24
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Eight Day Week Print Workflow plugin in WordPress, versions up to 1.2.5, contains a flaw (CWE‑497) that lets an unauthorized party retrieve sensitive system information embedded in the plugin. The vulnerability arises because the plugin’s data retrieval functionality does not enforce proper access control, permitting any user who can invoke the relevant API or administrative action to expose confidential details that should be restricted to privileged users. This can compromise the confidentiality of the web application and any data stored in the WordPress database.

Affected Systems

Any WordPress site that installs the 10up Eight Day Week Print Workflow plugin version 1.2.5 or earlier is affected. Site administrators who have not upgraded beyond 1.2.5 or disabled the plugin remain exposed to this information leakage.

Risk and Exploitability

The CVSS score of 4.3 classifies the issue as moderate. The EPSS score of less than 1% indicates a very low probability of exploitation in reality, and the vulnerability is not listed in the CISA KEV catalog, reducing the chance of an active exploit. Based on the description, the likely attack vector involves unauthenticated or minimally privileged access to a plugin endpoint that retrieves sensitive data, potentially through the WordPress admin interface or a REST API endpoint. No exploit steps have been disclosed, but any exposed end point that can trigger the data retrieval function could be queried by an attacker to read the sensitive data.

Generated by OpenCVE AI on April 30, 2026 at 04:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Eight Day Week Print Workflow plugin to the latest version that addresses the issue.
  • If an upgrade is not immediately available, disable the plugin and remove its files from the WordPress installation.
  • Restrict access to the plugin’s administrative interface and any exposed REST endpoints so that only authenticated administrators can view or modify plugin settings, and audit plugin files for sensitive data exposure.

Generated by OpenCVE AI on April 30, 2026 at 04:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Mon, 29 Dec 2025 23:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 24 Dec 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 24 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in 10up Eight Day Week Print Workflow eight-day-week-print-workflow allows Retrieve Embedded Sensitive Data.This issue affects Eight Day Week Print Workflow: from n/a through <= 1.2.5.
Title WordPress Eight Day Week Print Workflow plugin <= 1.2.5 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:22.804Z

Reserved: 2025-12-09T16:46:41.863Z

Link: CVE-2025-67621

cve-icon Vulnrichment

Updated: 2025-12-24T19:04:22.588Z

cve-icon NVD

Status : Deferred

Published: 2025-12-24T13:16:18.317

Modified: 2026-04-27T18:16:46.403

Link: CVE-2025-67621

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T04:45:06Z

Weaknesses