Information Exposure Vulnerability in Post Lockdown Plugin for WordPress
CVE-2025-1504

4.3MEDIUM

Key Information:

Vendor
Andyexeter
Status
Post Lockdown
Vendor
CVE Published:
8 March 2025

Summary

The Post Lockdown plugin for WordPress contains a vulnerability that allows authenticated attackers with Subscriber-level access and higher to exploit the 'pl_autocomplete' AJAX action. Due to inadequate restrictions on the posts accessed through this action, it is possible for these users to retrieve sensitive data from password-protected, private, or draft posts without proper authorization, posing serious security risks for WordPress sites using this plugin.

Affected Version(s)

Post Lockdown * <= 4.0.2

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Krzysztof Zając
.