BIT-wordpress-2023-5692

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/wordpress/BIT-wordpress-2023-5692.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-wordpress-2023-5692
Aliases
Published
2024-04-09T10:59:36.633Z
Modified
2026-04-08T18:31:22.177323Z
Summary
WordPress Core <= 6.4.3 - Sensitive Information Exposure via redirect_guess_404_permalink
Details

WordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirectguess404permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publiclyqueryable' post status has been set to 'false'.

Database specific
{
    "cpes": [
        "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
    ],
    "severity": "Medium"
}
References

Affected packages

Bitnami / wordpress

Package

Name
wordpress
Purl
pkg:bitnami/wordpress

Severity

  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.5.0

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/wordpress/BIT-wordpress-2023-5692.json"