CVE-2025-11693

9.8 CRITICAL

📋 TL;DR

The Export WP Page to Static HTML & PDF WordPress plugin exposes authentication cookies in publicly accessible cookies.txt files when administrators trigger backups. This allows unauthenticated attackers to steal session cookies and potentially hijack administrator accounts. All WordPress sites using this plugin up to version 4.3.4 are affected.

💻 Affected Systems

Products:
  • Export WP Page to Static HTML & PDF WordPress plugin
Versions: All versions up to and including 4.3.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator to trigger a backup using the plugin, which creates the vulnerable cookies.txt file.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative access to WordPress sites, enabling complete site takeover, data theft, malware injection, and further network compromise.

🟠

Likely Case

Attackers steal administrator session cookies and hijack WordPress admin accounts to modify content, install malicious plugins, or exfiltrate sensitive data.

🟢

If Mitigated

With proper file permissions and web server configuration, the cookies.txt file would not be publicly accessible, limiting exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires finding the exposed cookies.txt file URL, which follows predictable patterns based on backup timestamps.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.5

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3388166%40export-wp-page-to-static-html&new=3388166%40export-wp-page-to-static-html&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Export WP Page to Static HTML & PDF'. 4. Click 'Update Now' if available, or manually update to version 4.3.5+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Block cookies.txt access via .htaccess

linux

Prevent web access to cookies.txt files using Apache mod_rewrite rules

<Files "cookies.txt">
  Order Allow,Deny
  Deny from all
</Files>

Delete existing cookies.txt files

linux

Remove any existing exposed cookies.txt files from backup directories

find /path/to/wordpress -name "cookies.txt" -type f -delete

🧯 If You Can't Patch

  • Disable the Export WP Page to Static HTML & PDF plugin immediately
  • Implement web application firewall rules to block access to cookies.txt files

🔍 How to Verify

Check if Vulnerable:

Check if cookies.txt files exist in WordPress backup directories and are publicly accessible via URL (e.g., https://example.com/wp-content/uploads/export-wp-page-to-static-html/backup_*/cookies.txt)

Check Version:

wp plugin list --name="Export WP Page to Static HTML & PDF" --field=version

Verify Fix Applied:

Confirm plugin version is 4.3.5+ in WordPress admin panel and verify cookies.txt files are no longer publicly accessible

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 requests to cookies.txt files
  • Unusual admin login activity following cookie exposure

Network Indicators:

  • GET requests to */cookies.txt patterns
  • Traffic spikes to backup directories

SIEM Query:

url="*cookies.txt" AND http_status=200

🔗 References

📤 Share & Export