Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vikas Ratudi VPSUForm v-form allows Retrieve Embedded Sensitive Data.This issue affects VPSUForm: from n/a through <= 3.2.24.
Published: 2025-12-23
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

VPSUForm v-form for WordPress is susceptible to an exposure of sensitive system information. The flaw permits an unauthorized party to retrieve embedded sensitive data that should normally remain protected, leading to a breach of confidentiality.

Affected Systems

WordPress sites that have installed the VPSUForm plugin version 3.2.24 or earlier are affected. The plugin, produced by Vikas Ratudi, remains compromised until a newer release or patch is applied. All users running any early or intermediate versions of VPSUForm from its initial release through 3.2.24 are potentially exposed.

Risk and Exploitability

The CVSS score of 6.5 indicates medium severity, while the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The vulnerability is not listed in CISA KEV, implying no widespread exploits are currently known. Likely exploitation occurs through the web interface of the affected WordPress site, where an attacker can send crafted requests to the plugin’s endpoints to harvest the sensitive data.

Generated by OpenCVE AI on April 29, 2026 at 15:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the VPSUForm plugin to the latest version (at least 3.2.25) or any release that addresses the data exposure issue.
  • If an upgrade is not immediately possible, restrict external web access to the plugin’s administrative pages by modifying .htaccess rules or applying firewall restrictions to block unwanted requests.
  • Enable logging for the plugin’s request handling, review logs for suspicious activity, and consider implementing IP blocking or rate limiting to reduce the risk of data exfiltration.

Generated by OpenCVE AI on April 29, 2026 at 15:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vikas Ratudi VPSUForm allows Retrieve Embedded Sensitive Data.This issue affects VPSUForm: from n/a through 3.2.24. Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vikas Ratudi VPSUForm v-form allows Retrieve Embedded Sensitive Data.This issue affects VPSUForm: from n/a through <= 3.2.24.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Tue, 23 Dec 2025 23:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 23 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 23 Dec 2025 12:00:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vikas Ratudi VPSUForm allows Retrieve Embedded Sensitive Data.This issue affects VPSUForm: from n/a through 3.2.24.
Title WordPress VPSUForm plugin <= 3.2.24 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:30.248Z

Reserved: 2025-12-19T10:17:17.171Z

Link: CVE-2025-68551

cve-icon Vulnrichment

Updated: 2025-12-23T15:04:29.706Z

cve-icon NVD

Status : Deferred

Published: 2025-12-23T12:15:45.877

Modified: 2026-04-23T15:36:00.720

Link: CVE-2025-68551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T15:45:14Z

Weaknesses