[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fOIT7HdbWXxH-RZiKnYSTtfSur9isrn2LZp7_jGEp-RM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-14437","hummingbird-unauthenticated-sensitive-information-exposure-via-log-file","Hummingbird \u003C= 3.18.0 - Unauthenticated Sensitive Information Exposure via Log File","The Hummingbird Performance plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.18.0 via the 'request' function. This makes it possible for unauthenticated attackers to extract sensitive data including Cloudflare API credentials.","hummingbird-performance",null,"\u003C=3.18.0","3.18.1","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Insertion of Sensitive Information into Log File","2025-12-17 23:41:59","2025-12-18 12:22:29",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F8755ab3f-ee77-44ea-8620-590f1f1cb333?source=api-prod",1]