Skip to content

Security Test: WordPress REST API Users Exposed

Scanner(s) Support

GraphQL Scanner REST Scanner Frontend Scanner

Description

Default Severity:

The issue occurs when the WordPress REST API exposes user details through an unauthenticated request to /wp/users. This can allow attackers to enumerate users, aiding in reconnaissance and potentially targeting specific individuals for attacks.

Configuration

Identifier: information_disclosure/wordpress_rest_api_users_exposed

Examples

All configuration available:

checks:
  information_disclosure/wordpress_rest_api_users_exposed:
    skip: false # default

Compliance and Standards

Standard Value
OWASP API Top 10 API7:2023
OWASP LLM Top 10 LLM06:2023
PCI DSS 6.5.5
GDPR Article-32
SOC2 CC6
PSD2 Article-95
ISO 27001 A.14.2
NIST SP800-53
FedRAMP AC-6
CWE 200
CVSS Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:H/RL:O/RC:C
CVSS Score 5.1