[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fql2DQhO7fSXo7BZljx-cL6BibNZhMaKwmj69Er5-MvM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-57937","wpematico-rss-feed-fetcher-authenticated-subscriber-sensitive-information-exposure","WPeMatico RSS Feed Fetcher \u003C= 2.8.10 - Authenticated (Subscriber+) Sensitive Information Exposure","The WPeMatico RSS Feed Fetcher plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.8.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract sensitive user or configuration data.","wpematico",null,"\u003C=2.8.10","2.8.11","medium",4.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2025-09-22 00:00:00","2025-09-26 18:38:51",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F555a69e2-7ff2-48ea-a4de-04d8a47d02e3?source=api-prod",5]