Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Jeff Starr Simple Ajax Chat simple-ajax-chat allows Retrieve Embedded Sensitive Data.This issue affects Simple Ajax Chat: from n/a through <= 20251121.
Published: 2026-02-23
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive Data Exposure
Action: Apply Patch
AI Analysis

Impact

This vulnerability allows the retrieval of embedded sensitive system information from the Simple Ajax Chat WordPress plugin. Consequently, any unauthorized user can obtain confidential data, leading to a breach of confidentiality. The weakness, identified as CWE-497, permits exposure of sensitive data without proper access controls.

Affected Systems

The issue affects Jeff Starr’s Simple Ajax Chat plugin for WordPress on any installation using version 20251121 or earlier. No specific WordPress core version is mentioned, so any site running any of those plugin versions is at risk.

Risk and Exploitability

The CVSS score of 5.3 classifies the severity as moderate, while the EPSS score of less than 1% indicates a low likelihood of exploitation at the time of analysis. It is not listed in the CISA KEV catalog. The likely attack vector is through the plugin’s web interface or API, where an unauthenticated or insufficiently authorized user can trigger data retrieval. No additional prerequisites are described in the advisory, so the vulnerability can be exploited as long as the vulnerable plugin is active on a publicly accessible WordPress site.

Generated by OpenCVE AI on April 15, 2026 at 20:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Simple Ajax Chat plugin to a version newer than 20251121, if one is available.
  • If no update exists, disable or uninstall the plugin to eliminate the exposure.
  • Restrict access to the plugin’s API or data endpoints by requiring authentication or implementing IP restriction rules.

Generated by OpenCVE AI on April 15, 2026 at 20:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Jeff Starr
Jeff Starr simple Ajax Chat
Wordpress
Wordpress wordpress
Vendors & Products Jeff Starr
Jeff Starr simple Ajax Chat
Wordpress
Wordpress wordpress

Mon, 23 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Description Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Jeff Starr Simple Ajax Chat simple-ajax-chat allows Retrieve Embedded Sensitive Data.This issue affects Simple Ajax Chat: from n/a through <= 20251121.
Title WordPress Simple Ajax Chat plugin <= 20251121 - Sensitive Data Exposure vulnerability
Weaknesses CWE-497
References

Subscriptions

Jeff Starr Simple Ajax Chat
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:15:09.450Z

Reserved: 2026-02-23T20:46:14.458Z

Link: CVE-2026-3075

cve-icon Vulnrichment

Updated: 2026-02-27T17:55:44.648Z

cve-icon NVD

Status : Deferred

Published: 2026-02-23T21:19:13.140

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-3075

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T20:30:13Z

Weaknesses