Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-5561

Опубликовано: 16 окт. 2023
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS3: 5.3

Описание

WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack

РелизСтатусПримечание
bionic

ignored

end of standard support
devel

not-affected

6.4.3+dfsg1-1ubuntu1
esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/noble

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

lunar

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 98%
0.64148
Средний

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
nvd
больше 1 года назад

WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack

CVSS3: 5.3
debian
больше 1 года назад

WordPress does not properly restrict which user fields are searchable ...

CVSS3: 5.3
github
больше 1 года назад

The Popup Builder WordPress plugin through 4.1.15 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).

CVSS3: 5.3
fstec
больше 1 года назад

Уязвимость реализации прикладного программного интерфейса системы управления содержимым сайта WordPress, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 98%
0.64148
Средний

5.3 Medium

CVSS3