cve/2021/CVE-2021-24170.md

18 lines
873 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-24170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24170)
![](https://img.shields.io/static/v1?label=Product&message=User%20Profile%20Picture&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.5.0%3C%202.5.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brighgreen)
### Description
The REST API endpoint get_users in the User Profile Picture WordPress plugin before 2.5.0 returned more information than was required for its functionality to users with the upload_files capability. This included password hashes, hashed user activation keys, usernames, emails, and other less sensitive information.
### POC
#### Reference
- https://wpscan.com/vulnerability/29fc5b0e-0a5f-4484-a1e6-a0a1206726cc
#### Github
No PoCs found on GitHub currently.