Information Exposure Vulnerability in Post Lockdown Plugin for WordPress
CVE-2025-1504
4.3MEDIUM
Key Information:
- Vendor
- Andyexeter
- Status
- Post Lockdown
- Vendor
- CVE Published:
- 8 March 2025
Summary
The Post Lockdown plugin for WordPress contains a vulnerability that allows authenticated attackers with Subscriber-level access and higher to exploit the 'pl_autocomplete' AJAX action. Due to inadequate restrictions on the posts accessed through this action, it is possible for these users to retrieve sensitive data from password-protected, private, or draft posts without proper authorization, posing serious security risks for WordPress sites using this plugin.
Affected Version(s)
Post Lockdown * <= 4.0.2
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Krzysztof Zając