[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fpYr4b8KLzKtsfeSD_MO-H1snFsK1iBVqKTbVMGJv8GI":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-5998","ppwp-password-protect-pages-authenticated-subscriber-content-exposure-via-rest-api","PPWP – Password Protect Pages \u003C= 1.9.10 - Authenticated (Subscriber+) Content Exposure via REST API","The PPWP – Password Protect WordPress | #1 Most-Reviewed Password Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.9.10 due to insufficient protection on REST API endpoints when password protection is enabled. This makes it possible for unauthenticated attackers to extract post and page content that should be hidden.","password-protect-page",null,"\u003C=1.9.10","1.9.11","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Improper Handling of Insufficient Permissions or Privileges","2025-08-25 00:00:00","2025-08-25 15:34:54",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Ff9b392cb-04f9-475e-bfe3-d6086f2b5885?source=api-prod",1]