Custom Field Template Vulnerability (Medium) – CVE-2025-63058

Custom Field Template Vulnerability (Medium) – CVE-2025-63058

by | Feb 26, 2026 | Plugins

Attack Vectors

The vulnerability CVE-2025-63058 affects the WordPress plugin Custom Field Template (slug: custom-field-template) in versions 2.7.6 and earlier. It is rated Medium severity (CVSS 4.3) and is exploitable over the network, meaning an attacker can attempt exploitation remotely.

Critically for business owners, exploitation does not require an administrator account. Any authenticated WordPress user with Subscriber-level access or higher could potentially abuse the issue. This matters for organizations that allow user registration, run membership or community features, provide customer portals, or grant logins to vendors and contractors.

Because this is an authenticated issue, the most common real-world entry points are: compromised low-privilege accounts (credential reuse, phishing), unnecessary user accounts left active, and overly broad access given to third parties.

Security Weakness

CVE-2025-63058 is described as a Sensitive Information Exposure issue in Custom Field Template. In practical terms, the plugin may allow an authenticated user (Subscriber+) to access information they should not be able to see, including potentially sensitive user details or configuration-related data.

Even though the CVSS vector indicates no confidentiality impact in the published score, the vendor/source description explicitly frames the risk as exposure of sensitive information. From a governance and compliance standpoint, any unintended data disclosure should be treated as a business risk—especially if it includes user data, site configuration details, or anything that could be used to aid further attacks.

Technical or Business Impacts

If exploited, this weakness could lead to unauthorized visibility into information that supports fraud, account takeover attempts, or social engineering. In marketing-led organizations, the downstream impact can include disruption to website operations, reduced customer trust, and reputational damage—particularly if customers perceive that logged-in areas are not properly protected.

For executive leadership and compliance teams, the core risk is unintended disclosure: exposure of internal configuration details or user-related information can elevate regulatory and contractual concerns, trigger incident response obligations, and increase the likelihood of follow-on compromise. Even a “Medium” severity issue can become material if the affected site is high-traffic, customer-facing, or integrated with other systems.

Remediation: Update the Custom Field Template plugin to version 2.7.7 or newer (patched). In addition, review whether Subscriber registrations are necessary, remove inactive accounts, enforce strong passwords and MFA where possible, and ensure least-privilege access for any third-party users.

Similar Attacks

Information exposure weaknesses in web applications and plugins are frequently used to gather “stepping-stone” details for larger attacks. Real examples include:

CVE-2021-29447 (WordPress XXE in Media Library) — a WordPress-related flaw that could allow reading sensitive files and demonstrates how “data access” issues can amplify impact.

CVE-2023-34362 (MOVEit Transfer SQL Injection) — widely exploited to steal sensitive data; while a different technology, it highlights how information exposure leads directly to compliance and reputational consequences.

CVE-2018-13379 (Fortinet SSL VPN Path Traversal) — used to extract sensitive information (including session data), illustrating how disclosure flaws can enable broader compromise.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers