WP Reset is a widely used WordPress utility (400k+ installs) that accelerates development and recovery by resetting sites, managing snapshots, and handling licensing for its Pro features. During testing, we discovered CVE-2025-10645, a sensitive-data exposure flaw: when licensing is invoked, the plugin writes the submitted license key verbatim to a log file located under the publicly reachable wp-content/ directory. Because the logger is initialized with debug => true and no masking is applied to license_key, the log ends up disclosing raw keys alongside rich site metadata and server responses—all retrievable unauthenticated over HTTP on default setups.

CVECVE-2025-10645
Plugin VersionWP Reset <= 2.05
CriticalHigh
All Time9 529 498
Active installations400 000+
Publicly PublishedOctober 9, 2025
Last UpdatedOctober 9, 2025
ResearcherDmitrii Ignatyev
PoCYes
ExploitNo
Reference https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10645
https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/wp-reset-2/wp-reset-205-unauthenticated-sensitive-information-exposure-via-wf-licensinglog
Plugin Security Certification by CleanTalk
Logo of the plugin

Join the community of developers who prioritize security. Highlight your plugin in the WordPress catalog.

PSC by Cleantalk

Timeline

September 16, 2025Plugin testing and vulnerability detection in the WP Reset have been completed
September 16, 2025I contacted the author of the plugin and provided a vulnerability PoC with a description and recommendations for fixing
October 9, 2025Registered CVE-2025-10645

Discovery of the Vulnerability

The issue manifests in the licensing routine: on each validate/activate/deactivate attempt, WP Reset emits a structured log entry to wp-content/wf-licensing.log. The entry includes a timestamp; the licensing endpoint URL; the full request payload (site URL and title, WP and plugin versions, the exact license key, and a request nonce/random value); and the server response (status, message/body), plus exception stack traces on failures. Because the log is placed inside the webroot without access controls and the logger runs by default with verbose mode on, any internet user who knows or guesses the path can fetch it directly.

Understanding of Sensitive Data Exposure attack’s

Security best practices require that:

  • Secrets are never logged in cleartext (keys, tokens, passwords) – mask/redact at source.
  • Logs are not web-served – keep them outside the document root or restrict access server-side.
  • Debug logging is off in production – especially when it serializes request/response bodies.

Real-world incidents echo this pattern: licensing and payment gateways occasionally leave tokens in debug logs; backup and SMTP plugins have exposed credentials via public log files; and even core web server logs have leaked Authorization headers. CVE-2025-10645 falls squarely in this class—cleartext secret + public path—which is high severity despite the absence of code execution, because it enables license abuse and follow-on account or infrastructure attacks using the abundant metadata.

Exploiting the Sensitive Data Exposure Vulnerability

To exploit CVE-2025-10645, an attacker with no cookies:

POC:

Try to add some key in settings then try to fetch -> http://127.0.0.1/wordpress/wp-content/wf-licensing.log

____

License/Asset Abuse: Attackers reuse keys to activate Pro features elsewhere or resell them.

Targeted Attacks: Version strings + site URL/title fuel tailored exploits or phishing.

Configuration/Key Leakage: Response bodies and diagnostics may reveal endpoints, tenant IDs, or troubleshooting output that accelerates compromise.

Compliance/Privacy Impact: If logs capture emails, organization names, or other identifiers, the site owner faces GDPR/CCPA exposure and reputational harm.

Chaining Opportunities: Exposed nonces/randoms and environment footprints can assist in broader kill chains (credential-stuffing, plugin-specific RCEs, social engineering).

Recommendations for Improved Security

Update WP Reset plugin to a patched release as soon as it’s available.

By taking proactive measures to address Sensitive Data Exposure vulnerabilities like CVE-2025-10645 WordPress website owners can enhance their security posture and safeguard against potential exploitation. Stay vigilant, stay secure.

#WordPressSecurity #SensitiveDataExsposure #WebsiteSafety #StayProtected #HighVulnerability

Use CleanTalk solutions to improve the security of your website

Dmitrii I.
CVE-2025-10645 – WP Reset – Plaintext License Key Logging in Public Web-Accessible Log – POC

Leave a Reply

Your email address will not be published. Required fields are marked *