Medium severity4.3NVD Advisory· Published Oct 15, 2025· Updated Apr 15, 2026
CVE-2025-11196
CVE-2025-11196
Description
The External Login plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.11.2 due to the 'exlog_test_connection' AJAX action lacking capability checks or nonce validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to query the configured external database and retrieve truncated usernames, email addresses, and password hashes via the diagnostic test results view.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- plugins.trac.wordpress.org/browser/external-login/trunk/login/db.phpnvd
- plugins.trac.wordpress.org/browser/external-login/trunk/options/testing_ajax.phpnvd
- plugins.trac.wordpress.org/browser/external-login/trunk/views/test_results.phpnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/bdb40f51-dac2-40e7-beb1-154d982f7af3nvd
News mentions
0No linked articles in our index yet.