CVE-2025-5760

4.9 MEDIUM

📋 TL;DR

The Simple History WordPress plugin versions before 5.8.1 expose user passwords in clear text when Detective Mode is enabled. When users submit login forms, their actual passwords are written to the plugin's logs without redaction. This affects any WordPress site using vulnerable plugin versions where Detective Mode is enabled, potentially exposing passwords to administrators or anyone with database access.

💻 Affected Systems

Products:
  • WordPress Simple History Plugin
Versions: All versions prior to 5.8.1
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when Detective Mode is enabled. Detective Mode is not enabled by default but may be activated for debugging purposes.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

All user passwords on the WordPress site are exposed in clear text logs, allowing complete account takeover, privilege escalation, and credential reuse attacks across other systems.

🟠

Likely Case

Administrators or users with database access discover passwords in logs, leading to targeted account compromises and potential credential stuffing attacks.

🟢

If Mitigated

With Detective Mode disabled and proper access controls, passwords are not logged, limiting exposure to only what's captured through other logging mechanisms.

🌐 Internet-Facing: MEDIUM - While exploitation requires Detective Mode to be enabled and attacker access to logs, internet-facing WordPress sites with the vulnerable configuration expose passwords to anyone with sufficient privileges.
🏢 Internal Only: MEDIUM - Internal systems with the vulnerable configuration expose passwords to internal users with administrative or database access, potentially enabling lateral movement.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Detective Mode to be enabled and access to the Simple History logs (typically via WordPress admin or database access). No special tools needed - just reading the logs.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.8.1

Vendor Advisory: https://simple-history.com/support/detective-mode/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Simple History plugin. 4. Click 'Update Now' if update is available. 5. Alternatively, download version 5.8.1+ from WordPress plugin repository and manually update.

🔧 Temporary Workarounds

Disable Detective Mode

all

Turn off Detective Mode in Simple History plugin settings to prevent password logging

Disable Simple History Plugin

linux

Temporarily deactivate the plugin until patched

wp plugin deactivate simple-history

🧯 If You Can't Patch

  • Immediately disable Detective Mode in Simple History settings
  • Restrict database and WordPress admin access to only essential personnel

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Simple History → Version. If version is below 5.8.1 and Detective Mode is enabled, the system is vulnerable.

Check Version:

wp plugin get simple-history --field=version

Verify Fix Applied:

Verify plugin version is 5.8.1 or higher in WordPress admin panel. Check that password fields are no longer visible in Simple History logs after login attempts.

📡 Detection & Monitoring

Log Indicators:

  • Clear text passwords in Simple History logs
  • Login events with full POST data including password fields
  • Detective Mode enabled in plugin settings

Network Indicators:

  • Normal HTTP login traffic - no network anomalies

SIEM Query:

source="wordpress" AND "simple-history" AND ("password" OR "pwd" OR "pass") AND NOT "[REDACTED]"

🔗 References

📤 Share & Export