{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T15:52:28.668","vulnerabilities":[{"cve":{"id":"CVE-2025-5811","sourceIdentifier":"security@wordfence.com","published":"2025-07-18T06:15:26.523","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The Listly: Listicles For WordPress plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the Init() function in all versions up to, and including, 2.7. This makes it possible for unauthenticated attackers to delete arbitrary transient values on the WordPress site."},{"lang":"es","value":"El complemento Listly: Listicles For WordPress para WordPress es vulnerable a la modificación no autorizada de datos debido a la falta de una comprobación de capacidad en la función Init() en todas las versiones hasta la 2.7 incluida. Esto permite que atacantes no autenticados eliminen valores transitorios arbitrarios en el sitio de WordPress."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/listly/trunk/listly.php#L151","source":"security@wordfence.com"},{"url":"https://wordpress.org/plugins/listly/","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/ee6749f5-1dd0-4687-9a86-64fd1161321b?source=cve","source":"security@wordfence.com"}]}}]}