[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fQlypqPIHdCn2xU9Oi_97UFAZQb2D96_RmIuHGYcKtUs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":9,"severity":11,"cvss_score":12,"cvss_vector":13,"vuln_type":14,"published_date":15,"updated_date":16,"references":17,"days_to_patch":9,"patch_diff_files":19,"patch_trac_url":9},"CVE-2025-62126","varnishnginx-proxy-caching-unauthenticated-information-exposure","Varnish\u002FNginx Proxy Caching \u003C= 1.8.3 - Unauthenticated Information Exposure","The Varnish\u002FNginx Proxy Caching plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.8.3. This makes it possible for unauthenticated attackers to extract sensitive user or configuration data.","vcaching",null,"\u003C=1.8.3","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:H\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2025-12-31 00:00:00","2026-01-05 20:18:01",[18],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002Fc25fc6ff-1928-4690-bf1e-a5e87425c6f0?source=api-prod",[]]