Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Web application abuses
Title:WordPress User IDs and User Names Disclosure
Summary:WordPress platforms use a parameter called `author'. This parameter; accepts integer values and represents the `User ID' of users in the; web site. For example:
WordPress platforms use a parameter called `author'. This parameter
accepts integer values and represents the `User ID' of users in the
web site. For example:

Vulnerability Insight:
The problems found are:

1. User ID values are generated consecutively.

2. When a valid User ID is found, WordPress redirects to a web page
with the name of the author.

Vulnerability Impact:
These problems trigger the following attack vectors:

1. The query response discloses whether the User ID is enabled.

2. The query response leaks (by redirection) the User Name
corresponding with that User ID.

No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the
product or replace the product by another one.

CVSS Score:

CVSS Vector:

CopyrightThis script is Copyright (C) 2011 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2023 E-Soft Inc. All rights reserved.