Vulnerability Description
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wordpress | Wordpress | >= 4.7, < 4.7.27 |
References
- https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html
- https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6ExploitThird Party Advisory
- https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2023/11/msg00014.html
- https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6ExploitThird Party Advisory
- https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441Third Party Advisory
FAQ
What is CVE-2023-5561?
CVE-2023-5561 is a vulnerability with a CVSS score of 5.3 (MEDIUM). WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an...
How severe is CVE-2023-5561?
CVE-2023-5561 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5561?
Check the references section above for vendor advisories and patch information. Affected products include: Wordpress Wordpress.