Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through <= 4.38.0.
Published: 2026-01-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Patch
AI Analysis

Impact

An attacker can retrieve sensitive system information embedded within the Webpushr plugin. The vulnerability allows unauthorized access to data that should be protected, compromising the confidentiality of the application and potentially exposing credentials or configuration details. Based on the description, it is inferred that the attack vector is via a publicly accessible or poorly protected plugin interface, as the issue describes “Retrieve Embedded Sensitive Data”.

Affected Systems

WordPress sites that have installed the Webpushr Webpushr webpushr-web-push-notifications plugin version 4.38.0 or earlier are affected. The vulnerability applies to all installations of this plugin where the embedded sensitive data is present.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, reflecting the impact on confidentiality. The EPSS score of less than 1% suggests a low exploitation probability at present, and the vulnerability is not listed in the CISA KEV catalog. However, should the plugin or its administrative pages be exposed to external actors, an attacker could exploit this flaw to obtain sensitive information, especially if the site does not enforce strict access controls or SSL/TLS.

Generated by OpenCVE AI on April 28, 2026 at 17:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Webpushr to the latest version available, which removes the vulnerable data exposure code.
  • Restrict access to the WordPress admin area and the plugin’s administrative pages to trusted users only, minimizing the possibility of unauthorized exploitation.
  • Audit the plugin’s configuration and remove any sensitive data that may be embedded or exposed to reduce the attack surface.

Generated by OpenCVE AI on April 28, 2026 at 17:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Mon, 26 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Webpushr
Webpushr web Push Notifications
Wordpress
Wordpress wordpress
Vendors & Products Webpushr
Webpushr web Push Notifications
Wordpress
Wordpress wordpress

Fri, 23 Jan 2026 14:45:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in webpushr Webpushr webpushr-web-push-notifications allows Retrieve Embedded Sensitive Data.This issue affects Webpushr: from n/a through <= 4.38.0.
Title WordPress Webpushr plugin <= 4.38.0 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Webpushr Web Push Notifications
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:14:48.790Z

Reserved: 2026-01-23T12:31:40.820Z

Link: CVE-2026-24536

cve-icon Vulnrichment

Updated: 2026-01-26T19:08:33.625Z

cve-icon NVD

Status : Deferred

Published: 2026-01-23T15:16:09.733

Modified: 2026-04-28T15:16:11.420

Link: CVE-2026-24536

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T18:00:14Z

Weaknesses