Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-5692

Опубликовано: 05 апр. 2024
Источник: debian

Описание

WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
wordpressfixed6.5+dfsg1-1package
wordpressignoredbookwormpackage
wordpressignoredbullseyepackage

Примечания

  • https://core.trac.wordpress.org/changeset/57645

Связанные уязвимости

CVSS3: 5.3
ubuntu
почти 2 года назад

WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.

CVSS3: 5.3
nvd
почти 2 года назад

WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.

CVSS3: 5.3
github
почти 2 года назад

WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.