CVE-2025-31550

5.8 MEDIUM

📋 TL;DR

This vulnerability in the WP-LESS WordPress plugin allows attackers to retrieve sensitive data embedded in CSS files. It affects WordPress sites using WP-LESS versions 1.9.3 through 3, potentially exposing configuration details or other embedded information.

💻 Affected Systems

Products:
  • WP-LESS WordPress Plugin
Versions: 1.9.3 through 3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with WP-LESS plugin enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers retrieve database credentials, API keys, or other sensitive configuration data embedded in CSS files, leading to complete site compromise.

🟠

Likely Case

Attackers access configuration details or other embedded sensitive information that could facilitate further attacks.

🟢

If Mitigated

Limited exposure of non-critical embedded data with proper access controls and monitoring.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation involves accessing publicly accessible CSS files containing embedded sensitive data.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.1 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/wp-less/vulnerability/wordpress-wp-less-plugin-1-9-3-3-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WP-LESS plugin. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove vulnerable version. 6. Install version 3.1 or later from WordPress repository.

🔧 Temporary Workarounds

Disable WP-LESS Plugin

all

Temporarily disable the vulnerable plugin until patched version is available.

wp plugin deactivate wp-less

Restrict Access to CSS Files

linux

Configure web server to restrict direct access to generated CSS files.

# Add to .htaccess for Apache:
<Files "*.css">
  Require all denied
</Files>

# Add to nginx config:
location ~ \.css$ {
  deny all;
}

🧯 If You Can't Patch

  • Disable WP-LESS plugin immediately.
  • Implement web application firewall rules to block access to CSS files containing sensitive patterns.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Installed Plugins for WP-LESS version. If version is between 1.9.3 and 3.0, system is vulnerable.

Check Version:

wp plugin get wp-less --field=version

Verify Fix Applied:

Verify WP-LESS plugin version is 3.1 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to CSS files
  • Multiple requests to /wp-content/plugins/wp-less/ files

Network Indicators:

  • External IPs accessing CSS files with parameters
  • Unusual traffic to CSS endpoints

SIEM Query:

source="web_access_logs" AND (uri_path="*.css" OR uri_path="*/wp-less/*") AND status=200 AND src_ip NOT IN (internal_networks)

🔗 References

📤 Share & Export