The WebP Express plugin for WordPress is vulnerable to information exposure via config files in all versions up to, and including, 0.25.9. This is due to the plugin not properly randomizing the name of the config file to prevent direct access on NGINX. This makes it possible for unauthenticated attackers to extract configuration data.
Metrics
Affected Vendors & Products
References
History
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Roselldk
Roselldk webp Express Wordpress Wordpress wordpress |
|
| Vendors & Products |
Roselldk
Roselldk webp Express Wordpress Wordpress wordpress |
Thu, 04 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 04 Dec 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WebP Express plugin for WordPress is vulnerable to information exposure via config files in all versions up to, and including, 0.25.9. This is due to the plugin not properly randomizing the name of the config file to prevent direct access on NGINX. This makes it possible for unauthenticated attackers to extract configuration data. | |
| Title | WebP Express <= 0.25.9 - Unauthenticated Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-12-04T14:31:31.814Z
Reserved: 2025-10-06T16:49:53.311Z
Link: CVE-2025-11379
Updated: 2025-12-04T14:30:26.343Z
Status : Awaiting Analysis
Published: 2025-12-04T05:16:19.720
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-11379
No data.