CWE-200: Information Exposure
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Yearly Trend
Top Affected Vendors
All Information Exposure CVEs (1,072)
This vulnerability allows unauthenticated attackers to extract sensitive user information from WordPress sites using the Ultimate Member plugin. Attac...
Dec 20, 2025This vulnerability in the WordPress Events Manager plugin allows unauthenticated attackers to access sensitive event location data that should be prot...
Dec 12, 2025The Guest Support WordPress plugin up to version 1.2.3 contains an unauthenticated user email disclosure vulnerability. Attackers can exploit a public...
Dec 12, 2025This vulnerability in Tenda AC9 routers allows remote attackers to access configuration files via the /cgi-bin/DownloadCfg.jpg endpoint, potentially e...
Dec 9, 2025This vulnerability in Verysync 2.21.3 allows remote attackers to access sensitive information through the web administration module. The exploit targe...
Dec 7, 2025An information disclosure vulnerability in Verysync's web administration module allows remote attackers to access sensitive data via a specific API en...
Dec 7, 2025The WebP Express WordPress plugin exposes configuration data through predictable config file names on NGINX servers. Unauthenticated attackers can acc...
Dec 4, 2025The MxChat WordPress plugin exposes sensitive session information through uploaded filenames, allowing unauthenticated attackers to access conversatio...
Dec 3, 2025Horde Groupware v5.2.22 contains a user enumeration vulnerability that allows unauthenticated attackers to determine valid user accounts by checking r...
Dec 2, 2025The Zigaform WordPress plugin exposes sensitive form submission data through an unauthenticated AJAX endpoint. Unauthenticated attackers can extract p...
Dec 2, 2025The Locker Content WordPress plugin version 1.0.0 contains a sensitive information exposure vulnerability in its 'lockerco_submit_post' AJAX endpoint....
Nov 25, 2025The BigBuy Dropshipping Connector for WooCommerce WordPress plugin is vulnerable to IP address spoofing due to improper validation of user-supplied HT...
Nov 21, 2025This vulnerability in the LearnPress WordPress LMS plugin allows unauthenticated attackers to access sensitive educational content through a REST API ...
Nov 21, 2025The Quiz Maker WordPress plugin exposes quiz answers to unauthenticated attackers through an AJAX endpoint with insufficient authorization. This vulne...
Nov 19, 2025The New User Approve WordPress plugin has an API key validation vulnerability using loose equality comparison (== instead of ===). Unauthenticated att...
Nov 19, 2025This broken access control vulnerability allows authenticated low-privilege users to access sensitive information through the web management interface...
Nov 18, 2025The Comment Edit Core plugin for WordPress exposes sensitive user data including email addresses, IPs, and user IDs through an unauthenticated AJAX en...
Nov 13, 2025This vulnerability in the Academy LMS WordPress plugin exposes sensitive information including Facebook App Secret to unauthenticated attackers when F...
Nov 8, 2025This vulnerability in lakeFS allows unauthenticated access to the /api/v1/usage-report/summary endpoint, enabling anyone to retrieve aggregate API usa...
Nov 6, 2025This vulnerability in ownCloud Guests allows unauthenticated attackers to enumerate valid pending guest user email addresses. Attackers can determine ...
Nov 5, 2025This vulnerability allows unauthenticated attackers to access all WooCommerce coupon codes, IDs, and expiration status through a misconfigured REST AP...
Nov 5, 2025The KiotViet Sync WordPress plugin exposes webhook tokens to unauthenticated attackers through an API endpoint vulnerability. This allows attackers to...
Nov 5, 2025codeshare v1.0.0 contains an information leakage vulnerability that allows unauthorized access to users' full collaboration history. This affects all ...
Nov 4, 2025The Analytify Pro WordPress plugin exposes usernames in HTML source code to unauthenticated visitors. This affects all WordPress sites using Analytify...
Oct 31, 2025The WooCommerce plugin for WordPress versions up to 7.8.2 has improper CORS handling on Store API REST endpoints, allowing unauthenticated attackers t...
Oct 29, 2025PILOS (Platform for Interactive Live-Online Seminars) before version 4.8.0 exposes the PHP version via the X-Powered-By HTTP header, allowing attacker...
Oct 27, 2025The eRoom WordPress plugin exposes Zoom SDK secret keys in client-side JavaScript, allowing unauthenticated attackers to extract these credentials. Th...
Oct 25, 2025The PowerBI Embed Reports WordPress plugin up to version 1.2.0 contains an unauthenticated information disclosure vulnerability. Attackers can access ...
Oct 18, 2025The Code Quality Control Tool WordPress plugin versions 0.1 exposes sensitive information through publicly accessible log files. Unauthenticated attac...
Oct 11, 2025Frappe Learning versions before 2.38.0 stored student-uploaded assignment attachments as public files, allowing anyone with the file URL to access the...
Oct 10, 2025This vulnerability allows unauthenticated network attackers to determine whether specific LXD projects exist by sending crafted requests with wildcard...
Oct 2, 2025The File Manager, Code Editor, and Backup by Managefy WordPress plugin exposes sensitive information through publicly accessible log files. Unauthenti...
Oct 1, 2025An unauthenticated API endpoint in Vasion Print (formerly PrinterLogic) allows remote attackers to enumerate all group objects for a tenant. This expo...
Sep 29, 2025Campcodes Farm Management System 1.0 contains an information disclosure vulnerability that allows remote attackers to access sensitive file and direct...
Sep 27, 2025This CVE-2025-11028 vulnerability in givanz Vvveb's Image Handler component allows remote attackers to perform manipulation that results in informatio...
Sep 26, 2025This vulnerability in geyang ml-logger allows remote attackers to perform information disclosure by manipulating the 'key' argument in the stream_hand...
Sep 25, 2025The Events Calendar WordPress plugin versions up to 6.15.2 expose information about password-protected vendors or venues through a REST endpoint vulne...
Sep 16, 2025This vulnerability in Wavlink WL-WN578W2 routers allows remote attackers to access sensitive information through the /live_online.shtml file. The flaw...
Sep 12, 2025This vulnerability allows attackers to download encrypted database files containing passwords from Siemens building automation controllers without aut...
Sep 9, 2025An information disclosure vulnerability in Cisco phone systems allows unauthenticated remote attackers to access sensitive information when Web Access...
Sep 3, 2025An information disclosure vulnerability in Das Parking Management System 6.2.0 allows remote attackers to access sensitive data through the /Operator/...
Sep 3, 2025Das Parking Management System 6.2.0 has an information disclosure vulnerability in the /Operator/Search file that allows remote attackers to access se...
Sep 3, 2025This vulnerability in Contao CMS allows protected content elements to be indexed and publicly accessible through the front-end search functionality. A...
Aug 28, 2025This vulnerability in YiFang CMS allows remote attackers to access sensitive information through the exportInstallTable function in Migrate.php. It af...
Aug 25, 2025This vulnerability in zlt2000 microservices-platform exposes sensitive information through the Spring Actuator endpoint. Attackers can remotely access...
Aug 8, 2025The GiveWP WordPress plugin up to version 4.6.0 exposes donor information including names, emails, and donor IDs to unauthenticated attackers. This vu...
Aug 6, 2025This vulnerability in Exrick xboot allows remote attackers to access sensitive information through Spring Boot Admin/Spring Actuator endpoints. It aff...
Aug 4, 2025This vulnerability allows unauthorized users to access cached content from Umbraco's Content Delivery API even when API key authentication is required...
Jul 30, 2025The WoodMart WordPress theme plugin has an information exposure vulnerability that allows unauthenticated attackers to access password-protected, priv...
Jul 11, 2025Infoblox NETMRI versions before 7.6.1 contain a vulnerability that allows remote authenticated users to read arbitrary files with root-level access. T...
May 22, 2025About Information Exposure (CWE-200)
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Our database tracks 1,072 CVEs classified as CWE-200, with 93 rated critical and 394 rated high severity. The average CVSS score for Information Exposure vulnerabilities is 6.5.
External reference: View CWE-200 on MITRE CWE →
Monitor Information Exposure Vulnerabilities
Get alerted when new Information Exposure CVEs affect your infrastructure.
Start Monitoring Free