[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Update request for CVE-2023-5561 (WordPress)



Hello,

i would like to request an update of the status for the following CVE:

https://security-tracker.debian.org/tracker/CVE-2023-5561

Currently it has:

> NOT-FOR-US: WordPress plugin

which was correct based on the initial CVE description.

But unfortunately the assigning CNA had used a wrong CVE description as this is not an issue in a WordPress plugin but rather directly in "WordPress core".

The CVE description got updated in the meantime to correctly reflect that WordPress is affected:

> WordPress does not properly restrict which user fields are searchable
> via the REST API, allowing unauthenticated attackers to discern the
> email addresses of users who have published public posts on an
> affected website via an Oracle style attack

so the "NOT-FOR-US" status might need an update / new evaluation.

References:
- https://nvd.nist.gov/vuln/detail/CVE-2023-5561#VulnChangeHistorySection
- https://wpscan.com/blog/email-leak-oracle-vulnerability-addressed-in-wordpress-6-3-2/
- https://wpscan.com/vulnerability/19380917-4c27-4095-abf1-eba6f913b441

Regards,
Christian Fischer

--

Christian Fischer | PGP Key: 0x54F3CE5B76C597AD
Greenbone AG, Neumarkt 12, 49074 Osnabrück, Germany
https://www.greenbone.net/
Company registry: Amtsgericht Osnabrück, HRB 218768
Board of directors: Dr. Jan-Oliver Wagner (CEO), Elmar Geese
Chairman of the Supervisory Board: Lukas Grunwald


Reply to: