Lucene search

K
nvd[email protected]NVD:CVE-2023-5561
HistoryOct 16, 2023 - 8:15 p.m.

CVE-2023-5561

2023-10-1620:15:18
web.nvd.nist.gov
7
wordpress
rest api
user field
restriction bypass
unauthenticated attackers
email addresses
oracle style attack
cve-2023-5561

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

31.9%

WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack

Affected configurations

Nvd
Node
wordpresswordpressRange4.74.7.27
OR
wordpresswordpressRange4.84.8.23
OR
wordpresswordpressRange4.94.9.24
OR
wordpresswordpressRange5.05.0.20
OR
wordpresswordpressRange5.15.1.17
OR
wordpresswordpressRange5.25.2.19
OR
wordpresswordpressRange5.35.3.16
OR
wordpresswordpressRange5.45.4.14
OR
wordpresswordpressRange5.55.5.13
OR
wordpresswordpressRange5.65.6.12
OR
wordpresswordpressRange5.75.7.10
OR
wordpresswordpressRange5.85.8.8
OR
wordpresswordpressRange5.95.9.8
OR
wordpresswordpressRange6.06.0.6
OR
wordpresswordpressRange6.16.1.4
OR
wordpresswordpressRange6.26.2.3
OR
wordpresswordpressRange6.36.3.2
VendorProductVersionCPE
wordpresswordpress*cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

AI Score

5.4

Confidence

High

EPSS

0.001

Percentile

31.9%