Security Experts:

Connect with us

Hi, what are you looking for?


Application Security

Vulnerability in WordPress Mobile Pack Exposes Password-Protected Posts

Researchers at dxw Security have discovered a flaw in the WordPress Mobile Pack plugin that can be exploited to access password-protected posts.

Researchers at dxw Security have discovered a flaw in the WordPress Mobile Pack plugin that can be exploited to access password-protected posts.

dxw creates and hosts WordPress websites for the public sector. The company’s Security department reviews WordPress and WordPress plugins to ensure that the website developed by dxw and the plugins they use are secure.

WordPress Mobile Pack allows users to package their existing content into a cross-platform mobile Web application. Version 2.0 is supported on iPhones, Android smartphones, Windows Phone 8 and Firefox OS, and is compatible with Web browsers such as Safari, Chrome, Firefox, Internet Explorer 10 and the native browser in Android.

According to an advisory published on the Full Disclosure mailing list and on dxw Security’s website, the WordPress Mobile Pack plugin, which has been downloaded more than 610,000 times from the official WordPress site, is plagued by an information disclosure vulnerability which has been assigned the CVE identifier CVE-2014-5337.

The problem lies in a PHP file that can be used to read public and password-protected posts. The attacker doesn’t need to be authenticated for the exploit to work. However, draft and private posts are not exposed by the vulnerability, dxw Security said.

On websites with WordPress Mobile Pack enabled, the attack can be reproduced by visiting a URL in this form:


The password-protected post becomes visible in the form of JSON wrapped in “x()”.

The vulnerability was reported to the developers of WordPress Mobile Pack on July 24 and it was fixed on Tuesday with the release of version 2.0.2, which also addresses several non-security related bugs. Users are advised to update their installations to this or newer versions.

Serious vulnerabilities have been found in several popular WordPress plugins over the past period. Earlier this month, researchers from Sucuri reported finding a critical security hole in the Custom Contact Forms plugin that could have been exploited to gain control of affected websites.

Another serious vulnerability was identified in July in the WPtouch plugin. The flaw could have been leveraged to upload arbitrary PHP files to affected servers. The MailPoet plugin, which has been downloaded more than 2.2 million times from, contained a remote file upload vulnerability.


Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.