CVSS Vector
CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Lifecycle Timeline
3Description
XenForo before 2.3.7 allows information disclosure via local account page caching on shared systems. On systems where multiple users share a browser or machine, cached account pages could expose sensitive user information to other local users.
Analysis
XenForo before version 2.3.7 exposes sensitive user account information through improper browser caching of account pages on shared systems. Local users with access to a shared machine or browser can retrieve cached account data belonging to other users who previously accessed XenForo, enabling unauthorized information disclosure without authentication. No public exploit code or active exploitation has been identified; remediation requires upgrading to XenForo 2.3.7 or later.
Technical Context
This vulnerability stems from inadequate cache control headers on account pages served by XenForo (CWE-200: Information Exposure). When multiple users share a single browser or computer, HTTP caching mechanisms retain sensitive account page responses in local browser caches or system-level cache storage. XenForo's account pages-which contain personal user data, settings, and potentially authentication tokens-were not properly marked with cache-control directives (such as no-store, no-cache, or private with appropriate max-age values) to prevent local storage on multi-user systems. The affected product is XenForo, a PHP-based forum and community platform, where all versions before 2.3.7 lack proper cache isolation for account-related endpoints.
Affected Products
XenForo versions prior to 2.3.7 are affected (CPE: cpe:2.3:a:xenforo:xenforo:*:*:*:*:*:*:*:*). This includes all releases of XenForo 2.0.x through 2.3.6, and likely XenForo 1.x series, though the vulnerability description and vendor advisory reference XenForo 2.3.7 as the corrective release. The vendor advisory is available at https://xenforo.com/community/threads/xenforo-2-3-7-released-includes-security-fixes.232121/.
Remediation
Upgrade XenForo to version 2.3.7 or later immediately. This version includes fixes for the account page caching vulnerability that add proper cache-control headers and potentially other cache handling improvements to prevent sensitive data leakage on shared systems. Administrators should review the full release notes at https://xenforo.com/community/threads/xenforo-2-3-7-released-includes-security-fixes.232121/ for any additional configuration or post-upgrade steps. As an interim mitigation on systems where multiple users share browser access, ensure that shared computers have browser cache clearing enabled at shutdown, or instruct users to manually clear browser cache and temporary files after each session.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209154
GHSA-mvm5-rv5r-322q