Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack | https://github.com/pog007/CVE-2023-5561-PoC | POC Details |
| 2 | Updated POC for Unauth Post Author Email Disclosures WordPress CVE-2023-5561 | https://github.com/rootxsushant/CVE-2023-5561-POC-Updated | POC Details |
| 3 | WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-5561.yaml | POC Details |
| 4 | CVE-2023-5561-PoC | https://github.com/dthkhang/CVE-2023-5561-PoC | POC Details |
No public POC found.
Login to generate AI POCNo comments yet