CVE-2025-11891

5.3 MEDIUM

📋 TL;DR

The Shelf Planner WordPress plugin exposes sensitive information through publicly accessible log files in versions up to 2.7.0. Unauthenticated attackers can view potentially sensitive data from these logs. All WordPress sites using vulnerable versions of this plugin are affected.

💻 Affected Systems

Products:
  • Shelf Planner WordPress Plugin
Versions: All versions up to and including 2.7.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Shelf Planner plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain credentials, API keys, personal data, or other sensitive information leading to account compromise, data breaches, or further attacks.

🟠

Likely Case

Attackers harvest debugging information, user data, or configuration details that could facilitate targeted attacks or reconnaissance.

🟢

If Mitigated

Limited exposure of non-critical debugging information with minimal impact on security posture.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only web browser access to exposed log file URLs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.7.1 or later

Vendor Advisory: https://wordpress.org/plugins/shelf-planner/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Shelf Planner plugin. 4. Click 'Update Now' if update available. 5. Alternatively, download latest version from WordPress plugin repository and replace plugin files.

🔧 Temporary Workarounds

Restrict access to plugin directories

linux

Add .htaccess rules to block public access to plugin log directories

# Add to .htaccess in plugin directory:
Order deny,allow
Deny from all

Delete exposed log files

linux

Manually locate and delete any exposed log files in plugin directories

find /path/to/wordpress/wp-content/plugins/shelf-planner -name "*.log" -type f -delete

🧯 If You Can't Patch

  • Disable or remove the Shelf Planner plugin entirely
  • Implement web application firewall rules to block access to plugin log file paths

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel for Shelf Planner plugin version. If version is 2.7.0 or earlier, you are vulnerable.

Check Version:

wp plugin list --name=shelf-planner --field=version

Verify Fix Applied:

After updating, verify plugin version shows 2.7.1 or later in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 requests to paths containing '/shelf-planner/' and '.log' extensions
  • Unusual access patterns to plugin directories

Network Indicators:

  • HTTP GET requests to /wp-content/plugins/shelf-planner/*.log

SIEM Query:

source="web_access_logs" AND uri_path="/wp-content/plugins/shelf-planner/" AND uri_path="*.log"

🔗 References

📤 Share & Export