CVE-2025-14442

5.3 MEDIUM

📋 TL;DR

The Secure Copy Content Protection and Content Locking WordPress plugin stores exported CSV files in a publicly accessible directory with predictable filenames, allowing unauthenticated attackers to download sensitive user data including emails, IP addresses, usernames, roles, and location data. This affects all WordPress sites using the plugin up to version 4.9.2.

💻 Affected Systems

Products:
  • Secure Copy Content Protection and Content Locking WordPress plugin
Versions: All versions up to and including 4.9.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists when plugin's export functionality is used, creating CSV files in wp-content/uploads/secure-copy-content-protection/ directory with predictable names.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Mass data breach exposing all user data exported via the plugin, leading to identity theft, targeted phishing attacks, and regulatory compliance violations.

🟠

Likely Case

Unauthenticated attackers harvesting user email addresses and personal information for spam campaigns or credential stuffing attacks.

🟢

If Mitigated

Limited exposure if no CSV exports have been generated or if web server directory listing is disabled.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires guessing predictable filename patterns (e.g., export_*.csv) and accessing the publicly accessible directory path.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.9.3

Vendor Advisory: https://wordpress.org/plugins/secure-copy-content-protection/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Secure Copy Content Protection and Content Locking'. 4. Click 'Update Now' if available, or manually update to version 4.9.3+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Block directory access via .htaccess

linux

Prevent public access to the vulnerable directory using web server configuration.

echo 'Deny from all' > /path/to/wp-content/uploads/secure-copy-content-protection/.htaccess

Delete existing CSV export files

linux

Remove any sensitive CSV files already exported by the plugin.

rm -f /path/to/wp-content/uploads/secure-copy-content-protection/export_*.csv

🧯 If You Can't Patch

  • Disable the Secure Copy Content Protection plugin immediately
  • Implement web application firewall rules to block access to /wp-content/uploads/secure-copy-content-protection/ paths

🔍 How to Verify

Check if Vulnerable:

Check if plugin version is 4.9.2 or lower and test accessing /wp-content/uploads/secure-copy-content-protection/export_*.csv files directly via browser.

Check Version:

wp plugin list --name='secure-copy-content-protection' --field=version

Verify Fix Applied:

Confirm plugin version is 4.9.3+ and verify CSV files are no longer publicly accessible at the vulnerable path.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 requests to /wp-content/uploads/secure-copy-content-protection/export_*.csv from unauthenticated users
  • Multiple failed attempts to access predictable CSV filenames

Network Indicators:

  • Unusual traffic patterns to plugin export directory
  • CSV file downloads by non-admin users

SIEM Query:

source="web_access_logs" AND uri="/wp-content/uploads/secure-copy-content-protection/export_*" AND response="200"

🔗 References

📤 Share & Export