Search criteria
2 vulnerabilities found for Export WP Pages to HTML & PDF – Simply Create a Static Website by recorp
CVE-2025-11693 (GCVE-0-2025-11693)
Vulnerability from nvd – Published: 2025-12-13 04:31 – Updated: 2025-12-13 04:31
VLAI?
Summary
The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'
Severity ?
9.8 (Critical)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| recorp | Export WP Pages to HTML & PDF – Simply Create a Static Website |
Affected:
* , ≤ 4.3.4
(semver)
|
Credits
Jonas Benjamin Friedli
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Export WP Pages to HTML \u0026 PDF \u2013 Simply Create a Static Website",
"vendor": "recorp",
"versions": [
{
"lessThanOrEqual": "4.3.4",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Jonas Benjamin Friedli"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Export WP Page to Static HTML \u0026 PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like \u0027administrator.\u0027"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-13T04:31:33.724Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd28ac3c-aaef-49e3-843d-8532404703c9?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3388166%40export-wp-page-to-static-html\u0026new=3388166%40export-wp-page-to-static-html\u0026sfp_email=\u0026sfph_mail="
}
],
"timeline": [
{
"lang": "en",
"time": "2025-12-12T15:39:07.000+00:00",
"value": "Disclosed"
}
],
"title": "Export WP Page to Static HTML \u0026 PDF \u003c= 4.3.4 - Unauthenticated Cookie Exposure via Log File"
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2025-11693",
"datePublished": "2025-12-13T04:31:33.724Z",
"dateReserved": "2025-10-13T15:49:19.732Z",
"dateUpdated": "2025-12-13T04:31:33.724Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-11693 (GCVE-0-2025-11693)
Vulnerability from cvelistv5 – Published: 2025-12-13 04:31 – Updated: 2025-12-13 04:31
VLAI?
Summary
The Export WP Page to Static HTML & PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like 'administrator.'
Severity ?
9.8 (Critical)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| recorp | Export WP Pages to HTML & PDF – Simply Create a Static Website |
Affected:
* , ≤ 4.3.4
(semver)
|
Credits
Jonas Benjamin Friedli
{
"containers": {
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Export WP Pages to HTML \u0026 PDF \u2013 Simply Create a Static Website",
"vendor": "recorp",
"versions": [
{
"lessThanOrEqual": "4.3.4",
"status": "affected",
"version": "*",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Jonas Benjamin Friedli"
}
],
"descriptions": [
{
"lang": "en",
"value": "The Export WP Page to Static HTML \u0026 PDF plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.4 through publicly exposed cookies.txt files containing authentication cookies. This makes it possible for unauthenticated attackers to cookies that may have been injected into the log file if the site administrator triggered a back-up using a specific user role like \u0027administrator.\u0027"
}
],
"metrics": [
{
"cvssV3_1": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-13T04:31:33.724Z",
"orgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"shortName": "Wordfence"
},
"references": [
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd28ac3c-aaef-49e3-843d-8532404703c9?source=cve"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=\u0026sfph_mail=\u0026reponame=\u0026old=3388166%40export-wp-page-to-static-html\u0026new=3388166%40export-wp-page-to-static-html\u0026sfp_email=\u0026sfph_mail="
}
],
"timeline": [
{
"lang": "en",
"time": "2025-12-12T15:39:07.000+00:00",
"value": "Disclosed"
}
],
"title": "Export WP Page to Static HTML \u0026 PDF \u003c= 4.3.4 - Unauthenticated Cookie Exposure via Log File"
}
},
"cveMetadata": {
"assignerOrgId": "b15e7b5b-3da4-40ae-a43c-f7aa60e62599",
"assignerShortName": "Wordfence",
"cveId": "CVE-2025-11693",
"datePublished": "2025-12-13T04:31:33.724Z",
"dateReserved": "2025-10-13T15:49:19.732Z",
"dateUpdated": "2025-12-13T04:31:33.724Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}