Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 00:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 20 Jan 2026 23:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 30 Dec 2025 08:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Thu, 25 Dec 2025 05:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 24 Dec 2025 22:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in 10up Eight Day Week Print Workflow eight-day-week-print-workflow allows Retrieve Embedded Sensitive Data.This issue affects Eight Day Week Print Workflow: from n/a through <= 1.2.5. | |
| Title | WordPress Eight Day Week Print Workflow plugin <= 1.2.5 - Sensitive Data Exposure vulnerability | |
| Weaknesses | CWE-497 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-01-20T14:28:26.459Z
Reserved: 2025-12-09T16:46:41.863Z
Link: CVE-2025-67621
Updated: 2025-12-24T19:04:22.588Z
Status : Awaiting Analysis
Published: 2025-12-24T13:16:18.317
Modified: 2026-01-20T15:19:28.317
Link: CVE-2025-67621
No data.
OpenCVE Enrichment
Updated: 2025-12-30T07:34:26Z