The WebP Express plugin for WordPress is vulnerable to information exposure via config files in all versions up to, and including, 0.25.9. This is due to the plugin not properly randomizing the name of the config file to prevent direct access on NGINX. This makes it possible for unauthenticated attackers to extract configuration data.
History

Thu, 04 Dec 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Roselldk
Roselldk webp Express
Wordpress
Wordpress wordpress
Vendors & Products Roselldk
Roselldk webp Express
Wordpress
Wordpress wordpress

Thu, 04 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 04 Dec 2025 04:45:00 +0000

Type Values Removed Values Added
Description The WebP Express plugin for WordPress is vulnerable to information exposure via config files in all versions up to, and including, 0.25.9. This is due to the plugin not properly randomizing the name of the config file to prevent direct access on NGINX. This makes it possible for unauthenticated attackers to extract configuration data.
Title WebP Express <= 0.25.9 - Unauthenticated Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-12-04T14:31:31.814Z

Reserved: 2025-10-06T16:49:53.311Z

Link: CVE-2025-11379

cve-icon Vulnrichment

Updated: 2025-12-04T14:30:26.343Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-04T05:16:19.720

Modified: 2025-12-04T17:15:08.283

Link: CVE-2025-11379

cve-icon Redhat

No data.