First published: Sat May 03 2025(Updated: )
The Database Toolset plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.4 via backup files stored in a publicly accessible location. This makes it possible for unauthenticated attackers to extract sensitive data from database backup files. An index file is present, so a brute force attack would need to be successful in order to compromise any data.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Database Toolset | <=1.8.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-4222 is considered significant due to the risk of sensitive data exposure.
To fix CVE-2025-4222, it is recommended to update the Database Toolset plugin to the latest version beyond 1.8.4.
CVE-2025-4222 affects users of the Database Toolset plugin for WordPress in all versions up to and including 1.8.4.
CVE-2025-4222 may expose sensitive data from database backup files that are stored in publicly accessible locations.
Yes, unauthenticated attackers can exploit CVE-2025-4222 to access sensitive data from the vulnerable backup files.