Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 26 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Thu, 26 Mar 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Radiustheme
Radiustheme review Schema Wordpress Wordpress wordpress |
|
| Vendors & Products |
Radiustheme
Radiustheme review Schema Wordpress Wordpress wordpress |
Wed, 25 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in RadiusTheme Review Schema review-schema allows Retrieve Embedded Sensitive Data.This issue affects Review Schema: from n/a through <= 2.2.6. | |
| Title | WordPress Review Schema plugin <= 2.2.6 - Sensitive Data Exposure vulnerability | |
| Weaknesses | CWE-497 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-04-29T09:51:56.733Z
Reserved: 2026-02-02T12:52:42.957Z
Link: CVE-2026-25344
Updated: 2026-03-26T17:08:48.476Z
Status : Deferred
Published: 2026-03-25T17:16:45.070
Modified: 2026-04-24T16:32:53.997
Link: CVE-2026-25344
No data.
OpenCVE Enrichment
Updated: 2026-03-27T09:45:59Z