CVE-2025-62735

5.3 MEDIUM

📋 TL;DR

This vulnerability in the WordPress User Spam Remover plugin allows unauthorized users to retrieve embedded sensitive system information. It affects all WordPress sites running User Spam Remover version 1.1 or earlier. The exposure occurs through improper data handling in the plugin's functionality.

💻 Affected Systems

Products:
  • WordPress User Spam Remover plugin
Versions: <= 1.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive WordPress configuration details, database credentials, or server information leading to full site compromise.

🟠

Likely Case

Information disclosure revealing WordPress installation details, plugin configurations, or server metadata that could aid further attacks.

🟢

If Mitigated

Limited exposure of non-critical system information with proper access controls and network segmentation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves retrieving embedded data through plugin endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: >1.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/user-spam-remover/vulnerability/wordpress-user-spam-remover-plugin-1-1-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find User Spam Remover
4. Check for updates or remove if no update available
5. Update to latest version

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily deactivate the User Spam Remover plugin until patched

wp plugin deactivate user-spam-remover

Restrict Access

all

Use web application firewall to block requests to plugin endpoints

🧯 If You Can't Patch

  • Remove the User Spam Remover plugin entirely from WordPress installation
  • Implement strict network access controls to limit exposure of WordPress admin interfaces

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → User Spam Remover version number

Check Version:

wp plugin get user-spam-remover --field=version

Verify Fix Applied:

Verify plugin version is greater than 1.1 and test sensitive data endpoints

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to /wp-content/plugins/user-spam-remover/ endpoints
  • Multiple failed attempts to access plugin-specific URLs

Network Indicators:

  • Traffic patterns targeting plugin directories from unauthorized sources

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-content/plugins/user-spam-remover/" OR plugin="user-spam-remover")

🔗 References

📤 Share & Export