VYPR
Medium severity5.3NVD Advisory· Published Feb 18, 2026· Updated Apr 15, 2026

CVE-2025-12074

CVE-2025-12074

Description

The Context Blog theme for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.5 via the 'context_blog_modal_popup' due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Context Blog theme for WordPress up to v1.2.5 exposes password-protected, private, and draft posts via an unauthenticated AJAX endpoint.

The Context Blog WordPress theme, versions 1.2.5 and earlier, contains an information exposure vulnerability in the context_blog_modal_popup AJAX action. The function context_blog_modal_popup in /inc/ajax/modal-popup.php retrieves a post by its ID using get_post() and returns the full post content without checking whether the post is password-protected, private, or in draft status [3]. The theme registers this handler for both authenticated and unauthenticated users via wp_ajax_nopriv_ and wp_ajax_ hooks, meaning no authentication is required to trigger it [3].

An unauthenticated attacker can exploit this by sending a crafted AJAX request with a targetting the context_blog_modal_popup action with a numeric post ID. The endpoint lacks any capability or status checks, so it will return the post_content of any post, including those that should be restricted. The theme's post selection feature, which uses criteria like comment count, date, category, or tag [1][2], does not enforce visibility restrictions, making it possible to enumerate and extract content from non-public posts.

The impact is information disclosure: an attacker can read the full content of password-protected, private, or draft posts. This could leak sensitive information, unpublished content, or data intended only for specific users. The CVSS v3 base score is 5.3 (Medium), reflecting the low complexity and network-based attack vector with no privileges required.

As of the publication date (2026-02-18), users of the Context Blog theme should update to a patched version if available. The vendor's theme page [1][2] indicates the theme is free with optional commercial upgrades; no specific patch version is mentioned in the provided references. Administrators should check for updates or consider disabling the vulnerable versions until a fix is applied.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.