CVE-2025-15508

5.3 MEDIUM

📋 TL;DR

The Magic Import Document Extractor WordPress plugin exposes the site's magicimport.ai license key in page source code through the get_frontend_settings() function. Unauthenticated attackers can extract this sensitive information from any page containing the plugin's shortcode. All WordPress sites using this plugin up to version 1.0.4 are affected.

💻 Affected Systems

Products:
  • Magic Import Document Extractor WordPress Plugin
Versions: All versions up to and including 1.0.4
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability activates on any page containing the plugin's shortcode; no special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

License key theft enables unauthorized access to magicimport.ai services, potential service abuse, and exposure of associated account information.

🟠

Likely Case

Attackers steal license keys to abuse paid API services, incurring financial costs or service disruption for the legitimate owner.

🟢

If Mitigated

Limited to license key exposure without direct system compromise, but still enables service abuse and potential credential harvesting.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires viewing page source of pages with plugin shortcode; trivial for attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.5 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/magic-import-document-extractor

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Magic Import Document Extractor'. 4. Click 'Update Now' if update available. 5. Alternatively, download version 1.0.5+ from WordPress repository and replace plugin files.

🔧 Temporary Workarounds

Remove Plugin Shortcodes

all

Temporarily remove or disable the plugin's shortcodes from all pages/posts to prevent exposure.

Deactivate Plugin

all

Deactivate the plugin until patched to completely prevent information exposure.

🧯 If You Can't Patch

  • Rotate magicimport.ai license key immediately after patching
  • Monitor magicimport.ai API usage for unauthorized activity

🔍 How to Verify

Check if Vulnerable:

View page source of any page containing plugin shortcode and search for 'magicimport.ai' or license key patterns.

Check Version:

Check WordPress admin panel under Plugins > Installed Plugins for Magic Import Document Extractor version.

Verify Fix Applied:

After update, check page source again to confirm license key no longer appears in frontend code.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to pages with plugin shortcodes
  • Multiple requests to same pages from single IPs

Network Indicators:

  • HTTP requests to pages with shortcodes followed by immediate disconnection

SIEM Query:

source="web_access_logs" | search "GET /page-with-shortcode" | stats count by src_ip | where count > threshold

🔗 References

📤 Share & Export