S4E Mobile Logo

CVE-2025-12139 Scanner

CVE-2025-12139 Scanner - Information Disclosure vulnerability in Integrate Google Drive

Short Info


Level

High

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

20 days 17 hours

Scan only one

URL

Toolbox

The Integrate Google Drive plugin is designed to seamlessly connect Google Drive with WordPress, enabling website owners to manage their Google Drive files directly from their WordPress dashboard. It's widely used by WordPress developers, content creators, and businesses to enhance file management capabilities on websites. This plugin facilitates easy backup, file embedding, and collaborative file editing. It is particularly valuable for businesses relying on Google Drive for document management, providing a comprehensive solution to access and share documents. By integrating with WordPress, it streamlines workflows and improves efficiency in managing documents and media files.

The Information Disclosure vulnerability in the Integrate Google Drive plugin arises due to improper protection of the get_localize_data function. This vulnerability allows unauthenticated attackers to extract sensitive information such as Google OAuth credentials and account email addresses. As a high-severity vulnerability, it poses significant risks to users relying on this plugin for managing their Google Drive files. The issue highlights the critical need for comprehensive security controls around sensitive data handling. Ensuring proper access control mechanisms can mitigate such vulnerabilities.

This vulnerability specifically targets the functionality within the get_localize_data function, which lacks adequate protection against unauthorized access. The vulnerable parameters include client IDs, client secrets, and account information, which are exposed due to improper handling of sensitive data. Attackers can exploit this weakness by making crafted requests to the plugin, retrieving confidential information that can lead to account compromise. The endpoint is susceptible when the plugin version is less than or equal to 1.5.3.

If exploited, the vulnerability allows unauthorized individuals to obtain Google OAuth credentials and email addresses associated with user accounts. This can facilitate further attacks, including phishing or account takeover, jeopardizing both user privacy and data integrity. Unauthorized access to these credentials can lead to significant security breaches, posing considerable risks to users relying on the plugin for managing Google Drive integrations. Users may experience data theft or unauthorized actions performed under their accounts.

REFERENCES

Get started to protecting your digital assets