๐Ÿ” CVE Alert

CVE-2025-12525

MEDIUM 5.3

Locker Content <= 1.0.0 - Unauthenticated Information Exposure

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

The Locker Content plugin for WordPress is vulnerable to Sensitive Information Exposure in version 1.0.0 via the 'lockerco_submit_post' AJAX endpoint. This makes it possible for unauthenticated attackers to extract content from posts that has been protected by the plugin.

CWE CWE-200
Vendor appglut
Product locker content
Published Nov 25, 2025
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for appglut locker content

Be the first to know when new medium vulnerabilities affecting appglut locker content are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

appglut / Locker Content
0 โ‰ค 1.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/927f94b0-2a5d-4d17-a05b-7940d7976158?source=cve wordpress.org: https://wordpress.org/plugins/locker-content/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3400155%40locker-content&new=3400155%40locker-content

Credits

Athiwat Tiprasaharn