{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-30T03:53:01.435","vulnerabilities":[{"cve":{"id":"CVE-2025-14464","sourceIdentifier":"security@wordfence.com","published":"2026-01-14T06:15:52.440","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The PDF Resume Parser plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0. This is due to the plugin registering an AJAX action handler that is accessible to unauthenticated users and exposes SMTP configuration data including credentials. This makes it possible for unauthenticated attackers to extract sensitive SMTP credentials (username and password) from the WordPress configuration, which could be leveraged to compromise email accounts and potentially gain unauthorized access to other systems using the same credentials."},{"lang":"es","value":"El plugin PDF Resume Parser para WordPress es vulnerable a la exposición de información sensible en todas las versiones hasta la 1.0, inclusive. Esto se debe a que el plugin registra un manejador de acción AJAX que es accesible para usuarios no autenticados y expone datos de configuración SMTP, incluyendo credenciales. Esto hace posible que atacantes no autenticados extraigan credenciales SMTP sensibles (nombre de usuario y contraseña) de la configuración de WordPress, lo que podría ser aprovechado para comprometer cuentas de correo electrónico y potencialmente obtener acceso no autorizado a otros sistemas utilizando las mismas credenciales."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/pdf-resume-parser/tags/1.0/pdf-resume-parser.php#L309","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/pdf-resume-parser/trunk/pdf-resume-parser.php#L309","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/8a84bcc2-23e0-4624-89a4-7bbb1b34c498?source=cve","source":"security@wordfence.com"}]}}]}