Vulnerability Description
WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://core.trac.wordpress.org/changeset/57645
- https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/
- https://developer.wordpress.org/reference/functions/is_post_type_viewable/
- https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonica
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a
- https://core.trac.wordpress.org/changeset/57645
- https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/
- https://developer.wordpress.org/reference/functions/is_post_type_viewable/
- https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonica
- https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a
FAQ
What is CVE-2023-5692?
CVE-2023-5692 is a vulnerability with a CVSS score of 5.3 (MEDIUM). WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expos...
How severe is CVE-2023-5692?
CVE-2023-5692 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5692?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.