CVE-2025-62114
Lifecycle Timeline
2Description
Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in marcelotorres Download Media Library download-media-library allows Retrieve Embedded Sensitive Data.This issue affects Download Media Library: from n/a through <= 0.2.1.
Analysis
Download Media Library WordPress plugin through version 0.2.1 exposes sensitive system information to unauthorized users via embedded data retrieval. The vulnerability allows unauthenticated attackers to access restricted system details without proper access controls, though real-world exploitation probability remains low (EPSS 0.04%). No public exploit code or active exploitation has been confirmed.
Technical Context
CWE-497 (Exposure of Sensitive System Information to an Unauthorized Control Sphere) describes improper access controls that expose internal system data beyond intended security boundaries. In this WordPress plugin context, the vulnerability stems from insufficient authorization checks on functions or endpoints that retrieve or expose embedded metadata, configuration details, or system information. The plugin architecture fails to properly compartmentalize sensitive data, allowing any user (authenticated or unauthenticated) to access information that should remain restricted to administrators or privileged roles. This is a common issue in WordPress plugins when developers expose data through REST endpoints, AJAX handlers, or template functions without verifying user capabilities.
Affected Products
The vulnerability affects marcelotorres Download Media Library WordPress plugin in all versions from the earliest release through version 0.2.1 inclusive. The plugin is distributed via WordPress.org plugin repository and identified by slug download-media-library. Users running any version up to and including 0.2.1 are affected. Patchstack has confirmed the vulnerability via their security audit at https://patchstack.com/database/Wordpress/Plugin/download-media-library/vulnerability/wordpress-download-media-library-plugin-0-2-1-sensitive-data-exposure-vulnerability.
Remediation
Update Download Media Library plugin to version 0.2.2 or later as soon as a patched release becomes available. Until an official patch is released, disable the plugin entirely to prevent unauthorized sensitive data exposure. Ensure only administrators can access plugin functionality by implementing role-based access restrictions at the WordPress level (user capability checks via current_user_can()). Verify the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/download-media-library/vulnerability/wordpress-download-media-library-plugin-0-2-1-sensitive-data-exposure-vulnerability for updates on patch availability and detailed remediation guidance from the vendor.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today