Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 24 Nov 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 21 Nov 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The 简数采集器 plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.6.3 via the __kds_flag functionality that imports featured images. This makes it possible for authenticated attackers, with Adminstrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. | |
| Title | 简数采集器 <= 2.6.3 - Authenticated (Admin+) Arbitrary File Read | |
| Weaknesses | CWE-73 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:58:05.517Z
Reserved: 2025-10-20T15:47:04.960Z
Link: CVE-2025-11973
Updated: 2025-11-21T15:31:02.589Z
Status : Deferred
Published: 2025-11-21T09:15:46.193
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-11973
No data.
OpenCVE Enrichment
Updated: 2026-04-22T12:00:05Z