### [CVE-2021-24170](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24170) ![](https://img.shields.io/static/v1?label=Product&message=User%20Profile%20Picture&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.5.0%3C%202.5.0%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-200%20Information%20Exposure&color=brighgreen) ### Description The REST API endpoint get_users in the User Profile Picture WordPress plugin before 2.5.0 returned more information than was required for its functionality to users with the upload_files capability. This included password hashes, hashed user activation keys, usernames, emails, and other less sensitive information. ### POC #### Reference - https://wpscan.com/vulnerability/29fc5b0e-0a5f-4484-a1e6-a0a1206726cc #### Github No PoCs found on GitHub currently.