CVE-2025-64218

7.5 HIGH

📋 TL;DR

This vulnerability in the Passster WordPress plugin allows attackers to retrieve embedded sensitive data that should be protected. It affects all WordPress sites using Passster content-protector plugin versions up to 4.2.19. Attackers can access protected content without proper authorization.

💻 Affected Systems

Products:
  • WordPress Passster (content-protector) plugin
Versions: All versions up to and including 4.2.19
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable Passster plugin versions installed and active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete exposure of all protected content including sensitive documents, private information, and premium content intended for authorized users only.

🟠

Likely Case

Unauthorized access to protected pages, posts, or media that should be restricted to specific users or subscribers.

🟢

If Mitigated

Limited exposure if minimal sensitive content is protected by the plugin or if additional access controls are implemented.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability involves information disclosure through data sent to clients, making exploitation straightforward once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.2.20 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/content-protector/vulnerability/wordpress-passster-plugin-4-2-19-sensitive-data-exposure-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'Passster' plugin
4. Click 'Update Now' if update is available
5. If no update appears, manually download version 4.2.20+ from WordPress.org
6. Deactivate old version, upload new version, activate

🔧 Temporary Workarounds

Disable Passster Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate passster

Restrict Access via .htaccess

linux

Add IP-based restrictions to protected content directories

Order deny,allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement alternative content protection using WordPress native capabilities or different plugin
  • Monitor access logs for unusual requests to protected content URLs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Passster version ≤4.2.19

Check Version:

wp plugin get passster --field=version

Verify Fix Applied:

Confirm Passster plugin version is 4.2.20 or higher in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to protected content URLs
  • Multiple failed then successful access attempts to restricted areas

Network Indicators:

  • Requests bypassing expected authentication flows
  • Unusual data retrieval from protected endpoints

SIEM Query:

source="wordpress.log" AND ("passster" OR "protected-content") AND status=200 AND user="unauthenticated"

🔗 References

📤 Share & Export