Breadcrumb NavXT Vulnerability (Medium) – CVE-2025-13842

Breadcrumb NavXT Vulnerability (Medium) – CVE-2025-13842

by | Feb 18, 2026 | Plugins

Attack Vectors

Breadcrumb NavXT (slug: breadcrumb-navxt) has a Medium severity vulnerability (CVSS 5.3, CVE-2025-13842) that can be exploited remotely by unauthenticated attackers.

The issue stems from the plugin’s Gutenberg block renderer trusting a user-supplied request parameter (post_id) without verification. In practical terms, an attacker can manipulate that parameter to request breadcrumb trails for content that is not publicly visible.

This enables content enumeration—an attacker can probe different post IDs and observe breadcrumb output that may reference posts that are drafts or marked private.

Security Weakness

The weakness is a missing authorization check that results in sensitive information exposure. According to the published advisory, the Gutenberg block renderer trusts the request parameter without validating whether the requester should have access to that post’s breadcrumb trail.

As a result, breadcrumb data can be generated for posts that should be restricted, potentially exposing post titles and site hierarchy related to draft or private content.

Affected versions are Breadcrumb NavXT 7.5.0 and earlier. The recommended remediation is to update to 7.5.1 or newer, which contains the patch.

Technical or Business Impacts

While this is not described as a full content leak, it can expose confidential signals that are often business-sensitive: upcoming campaign names, product launches, partner references, legal pages in preparation, internal initiatives, or rebrand planning embedded in draft/private post titles and their relationships.

For marketing and executive stakeholders, the risk is primarily reputational and competitive: unintended disclosure can undermine launch timing, give competitors early insight into positioning, or create confusion if draft messaging becomes discoverable before approvals are complete.

For compliance and governance teams, this can represent an information disclosure event depending on what draft/private titles contain, potentially impacting internal controls around confidentiality and publishing workflows.

Action to reduce risk: confirm whether Breadcrumb NavXT is installed and update immediately to 7.5.1+. If updating must be delayed, consider temporarily limiting exposure of the affected block usage until patching is complete.

Similar Attacks

Authorization gaps that expose private or draft information are a common real-world pattern in web and content systems. Examples include:

MOVEit Transfer exploitation (CISA Alert) — attackers accessed sensitive data via a widely exploited flaw

Barracuda ESG exploitation (CISA Advisory) — exploited vulnerabilities led to unauthorized access and data exposure

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers