CVE-2025-11196
External Login <= 1.11.2 - Authenticated (Subscriber+) Sensitive Data Exposure via Test Connection
CVSS Score
4.3
EPSS Score
0.0%
EPSS Percentile
0th
The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
| CWE | CWE-200 |
| Vendor | tbenyon |
| Product | external login |
| Published | Oct 15, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for tbenyon external login
Be the first to know when new medium vulnerabilities affecting tbenyon external login are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
tbenyon / External Login
0 โค 1.11.2
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/bdb40f51-dac2-40e7-beb1-154d982f7af3?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/external-login/trunk/options/testing_ajax.php#L3 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/external-login/trunk/login/db.php#L215 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/external-login/trunk/views/test_results.php#L21
Credits
Jonas Benjamin Friedli