CVE-2025-26730

7.5 HIGH

📋 TL;DR

This vulnerability exposes sensitive system information to unauthorized users in the WordPress Macro Calculator with Admin Email Optin & Data plugin. Attackers can access internal system details that should be protected, potentially leading to further attacks. All WordPress sites using this plugin version 1.0 or earlier are affected.

💻 Affected Systems

Products:
  • WordPress Macro Calculator with Admin Email Optin & Data plugin
Versions: 1.0 and earlier
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with the vulnerable plugin version are affected regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers obtain sensitive system configuration, server paths, or internal data that enables targeted follow-on attacks, privilege escalation, or complete system compromise.

🟠

Likely Case

Unauthorized users access internal system information, directory structures, or configuration details that could aid in reconnaissance for further attacks.

🟢

If Mitigated

Information exposure is prevented through proper access controls and security hardening, limiting the impact to minimal information leakage.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CWE-497 typically involves simple information disclosure that doesn't require complex exploitation techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/macro-admin-email-data-optin-calculator/vulnerability/wordpress-macro-calculator-with-admin-email-optin-data-plugin-1-0-multiple-vulnerabilities-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Remove the vulnerable plugin from WordPress. 2. Monitor for official patch release. 3. Reinstall only when patched version is available.

🔧 Temporary Workarounds

Disable or Remove Plugin

all

Completely remove the vulnerable plugin from WordPress to eliminate the vulnerability.

wp plugin deactivate macro-calculator-with-admin-email-optin-data
wp plugin delete macro-calculator-with-admin-email-optin-data

Restrict Access via Web Application Firewall

all

Block requests to the vulnerable plugin endpoints using WAF rules.

🧯 If You Can't Patch

  • Isolate affected systems from internet access
  • Implement strict network segmentation and monitoring

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Macro Calculator with Admin Email Optin & Data. If version is 1.0 or earlier, you are vulnerable.

Check Version:

wp plugin list --name='Macro Calculator with Admin Email Optin & Data' --field=version

Verify Fix Applied:

Verify plugin is removed or disabled in WordPress admin panel. Check that no files from the plugin remain in wp-content/plugins/.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to plugin endpoints
  • Access to sensitive information disclosure paths
  • Increased scanning activity targeting the plugin

Network Indicators:

  • HTTP requests to /wp-content/plugins/macro-calculator-with-admin-email-optin-data/
  • Patterns of information gathering requests

SIEM Query:

source="web_server" AND (uri_path="*macro-calculator*" OR user_agent="*scanner*")

🔗 References

📤 Share & Export