Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2023-5561 — Sensitive Information Exposure in Wordpress
Severity
5.3MEDIUMNVD
EPSS
53.0%
top 2.03%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 16
Latest updateMar 5
Description
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages3 packages
🔴Vulnerability Details
3OSV▶
CVE-2023-5561: WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addres↗2023-10-16
💥Exploits & PoCs
1Nuclei▶
WordPress Core - Post Author Email Disclosure
📋Vendor Advisories
1Debian▶
CVE-2023-5561: wordpress - WordPress does not properly restrict which user fields are searchable via the RE...↗2023