CVE-2019-9880

An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 04:52

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/153025/WordPress-WPGraphQL-0.2.3-Authentication-Bypass-Information-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References () https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py - Exploit, Third Party Advisory () https://github.com/pentestpartners/snippets/blob/master/wp-graphql0.2.3_exploit.py - Exploit, Third Party Advisory
References () https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 - Release Notes, Third Party Advisory () https://github.com/wp-graphql/wp-graphql/releases/tag/v0.3.0 - Release Notes, Third Party Advisory
References () https://wpvulndb.com/vulnerabilities/9282 - Vendor Advisory () https://wpvulndb.com/vulnerabilities/9282 - Vendor Advisory
References () https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ - Exploit, Third Party Advisory () https://www.pentestpartners.com/security-blog/pwning-wordpress-graphql/ - Exploit, Third Party Advisory

22 Jan 2024, 15:39

Type Values Removed Values Added
CPE cpe:2.3:a:wpgraphql:wpgraphql:0.2.3:*:*:*:*:wordpress:*:* cpe:2.3:a:wpengine:wpgraphql:0.2.3:*:*:*:*:wordpress:*:*

Information

Published : 2019-06-10 18:29

Updated : 2024-11-21 04:52


NVD link : CVE-2019-9880

Mitre link : CVE-2019-9880

CVE.ORG link : CVE-2019-9880


JSON object : View

Products Affected

wpengine

  • wpgraphql
CWE
CWE-306

Missing Authentication for Critical Function