Description
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3658-1 | wordpress security update |
Debian DSA |
DSA-5685-1 | wordpress security update |
References
History
No history.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-23T16:12:25.833Z
Reserved: 2023-10-12T17:42:19.461Z
Link: CVE-2023-5561
No data.
Status : Modified
Published: 2023-10-16T20:15:18.073
Modified: 2025-04-23T17:16:50.853
Link: CVE-2023-5561
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA