WP <=6.8.2: Insert Sensitive Info into Outgoing Data (Contributor Priv.)
CVE-2025-58246 Published on September 23, 2025
WordPress <= 6.8.2 - (Contributor+) Sensitive Data Exposure Vulnerability
Insertion of Sensitive Information Into Sent Data vulnerability in WordPress allows Retrieve Embedded Sensitive Data. The WordPress Core security team is aware of the issue and is already working on a fix. This is a low-severity vulnerability. Contributor-level privileges required in order to exploit it.
This issue affects WordPress: from 6.8 through 6.8.2, from 6.7 through 6.7.3, from 6.6 through 6.6.3, from 6.5 through 6.5.6, from 6.4 through 6.4.6, from 6.3 through 6.3.6, from 6.2 through 6.2.7, from 6.1 through 6.1.8, from 6.0 through 6.0.10, from 5.9 through 5.9.11, from 5.8 through 5.8.11, from 5.7 through 5.7.13, from 5.6 through 5.6.15, from 5.5 through 5.5.16, from 5.4 through 5.4.17, from 5.3 through 5.3.19, from 5.2 through 5.2.22, from 5.1 through 5.1.20, from 5.0 through 5.0.23, from 4.9 through 4.9.27, from 4.8 through 4.8.26, from 4.7 through 4.7.30.
Vulnerability Analysis
CVE-2025-58246 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality, a small impact on integrity and availability.
Weakness Type
Insertion of Sensitive Information Into Sent Data
The code transmits data to another actor, but a portion of the data includes sensitive information that should not be accessible to that actor. Sensitive information could include data that is sensitive in and of itself (such as credentials or private messages), or otherwise useful in the further exploitation of the system (such as internal file system structure).
Products Associated with CVE-2025-58246
stack.watch emails you whenever new vulnerabilities are published in Automattic Wordpress or WordPress. Just hit a watch button to start following.
Affected Versions
WordPress:- Version 6.8, <= 6.8.2 is affected.
- Version 6.7, <= 6.7.3 is affected.
- Version 6.6, <= 6.6.3 is affected.
- Version 6.5, <= 6.5.6 is affected.
- Version 6.4, <= 6.4.6 is affected.
- Version 6.3, <= 6.3.6 is affected.
- Version 6.2, <= 6.2.7 is affected.
- Version 6.1, <= 6.1.8 is affected.
- Version 6.0, <= 6.0.10 is affected.
- Version 5.9, <= 5.9.11 is affected.
- Version 5.8, <= 5.8.11 is affected.
- Version 5.7, <= 5.7.13 is affected.
- Version 5.6, <= 5.6.15 is affected.
- Version 5.5, <= 5.5.16 is affected.
- Version 5.4, <= 5.4.17 is affected.
- Version 5.3, <= 5.3.19 is affected.
- Version 5.2, <= 5.2.22 is affected.
- Version 5.1, <= 5.1.20 is affected.
- Version 5.0, <= 5.0.23 is affected.
- Version 4.9, <= 4.9.27 is affected.
- Version 4.8, <= 4.8.26 is affected.
- Version 4.7, <= 4.7.30 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.