First published: Fri Jan 24 2025(Updated: )
Insertion of Sensitive Information Into Sent Data vulnerability in Code for Recovery 12 Step Meeting List allows Retrieve Embedded Sensitive Data. This issue affects 12 Step Meeting List: from n/a through 3.16.5.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress 12 Step Meeting List | >=n/a<3.16.5 | |
WordPress 12 Step Meeting List | <=3.16.5 |
Update the WordPress 12 Step Meeting List wordpress plugin to the latest available version (at least 3.16.6).
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24582 is classified as a medium severity vulnerability due to the potential exposure of sensitive data.
To fix CVE-2025-24582, update the Code for Recovery 12 Step Meeting List plugin to version 3.16.6 or later.
CVE-2025-24582 allows the retrieval of embedded sensitive data which can include personal or confidential information.
CVE-2025-24582 affects users of the Code for Recovery 12 Step Meeting List and WordPress 12 Step Meeting List plugin versions up to 3.16.5.
Currently, the best practice is to upgrade to a patched version as there are no known workarounds for CVE-2025-24582.