Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-jghn-eujf-zbdn
SummaryWordPress Core is vulnerable to Sensitive Information Exposure in versions up to, and including, 6.4.3 via the redirect_guess_404_permalink function. This can allow unauthenticated attackers to expose the slug of a custom post whose 'publicly_queryable' post status has been set to 'false'.
Aliases
0
alias CVE-2023-5692
Fixed_packages
0
url pkg:deb/debian/wordpress@6.5%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.5%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.5%252Bdfsg1-1%3Fdistro=trixie
1
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1
2
url pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
purl pkg:deb/debian/wordpress@6.8.3%2Bdfsg1-0%2Bdeb13u1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.8.3%252Bdfsg1-0%252Bdeb13u1%3Fdistro=trixie
3
url pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
purl pkg:deb/debian/wordpress@6.9.4%2Bdfsg1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.9.4%252Bdfsg1-1%3Fdistro=trixie
Affected_packages
0
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-4g2n-5v12-yuff
1
vulnerability VCID-532z-9qbb-dyfw
2
vulnerability VCID-gyaq-8pvh-p7gg
3
vulnerability VCID-jghn-eujf-zbdn
4
vulnerability VCID-m8mf-t2td-67h7
5
vulnerability VCID-yqam-kpce-dfg7
6
vulnerability VCID-zj9a-shru-e7gs
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1
1
url pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
purl pkg:deb/debian/wordpress@5.7.11%2Bdfsg1-0%2Bdeb11u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
2
vulnerability VCID-yqam-kpce-dfg7
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@5.7.11%252Bdfsg1-0%252Bdeb11u1%3Fdistro=trixie
2
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1
3
url pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
purl pkg:deb/debian/wordpress@6.1.9%2Bdfsg1-0%2Bdeb12u1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-gyaq-8pvh-p7gg
1
vulnerability VCID-jghn-eujf-zbdn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wordpress@6.1.9%252Bdfsg1-0%252Bdeb12u1%3Fdistro=trixie
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5692
reference_id
reference_type
scores
0
value 0.00855
scoring_system epss
scoring_elements 0.74907
published_at 2026-04-02T12:55:00Z
1
value 0.00855
scoring_system epss
scoring_elements 0.74935
published_at 2026-04-04T12:55:00Z
2
value 0.00855
scoring_system epss
scoring_elements 0.74908
published_at 2026-04-07T12:55:00Z
3
value 0.00855
scoring_system epss
scoring_elements 0.74942
published_at 2026-04-08T12:55:00Z
4
value 0.00855
scoring_system epss
scoring_elements 0.74954
published_at 2026-04-09T12:55:00Z
5
value 0.00855
scoring_system epss
scoring_elements 0.74977
published_at 2026-04-11T12:55:00Z
6
value 0.00855
scoring_system epss
scoring_elements 0.74956
published_at 2026-04-12T12:55:00Z
7
value 0.00855
scoring_system epss
scoring_elements 0.74946
published_at 2026-04-13T12:55:00Z
8
value 0.00855
scoring_system epss
scoring_elements 0.74983
published_at 2026-04-16T12:55:00Z
9
value 0.00855
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-18T12:55:00Z
10
value 0.01055
scoring_system epss
scoring_elements 0.77781
published_at 2026-05-14T12:55:00Z
11
value 0.01055
scoring_system epss
scoring_elements 0.77719
published_at 2026-05-11T12:55:00Z
12
value 0.01055
scoring_system epss
scoring_elements 0.77736
published_at 2026-05-12T12:55:00Z
13
value 0.01055
scoring_system epss
scoring_elements 0.77617
published_at 2026-04-21T12:55:00Z
14
value 0.01055
scoring_system epss
scoring_elements 0.77682
published_at 2026-05-05T12:55:00Z
15
value 0.01055
scoring_system epss
scoring_elements 0.77711
published_at 2026-05-07T12:55:00Z
16
value 0.01055
scoring_system epss
scoring_elements 0.7773
published_at 2026-05-09T12:55:00Z
17
value 0.01084
scoring_system epss
scoring_elements 0.77937
published_at 2026-04-24T12:55:00Z
18
value 0.01084
scoring_system epss
scoring_elements 0.77944
published_at 2026-04-26T12:55:00Z
19
value 0.01084
scoring_system epss
scoring_elements 0.77958
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5692
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5692
2
reference_url https://core.trac.wordpress.org/changeset/57645
reference_id 57645
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://core.trac.wordpress.org/changeset/57645
3
reference_url https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve
reference_id 6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://www.wordfence.com/threat-intel/vulnerabilities/id/6e6f993b-ce09-4050-84a1-cbe9953f36b1?source=cve
4
reference_url https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonical.php#L763
reference_id canonical.php#L763
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://github.com/WordPress/wordpress-develop/blob/6.3/src/wp-includes/canonical.php#L763
5
reference_url https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/
reference_id is_post_publicly_viewable
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://developer.wordpress.org/reference/functions/is_post_publicly_viewable/
6
reference_url https://developer.wordpress.org/reference/functions/is_post_type_viewable/
reference_id is_post_type_viewable
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-05T13:58:59Z/
url https://developer.wordpress.org/reference/functions/is_post_type_viewable/
Weaknesses
0
cwe_id 200
name Exposure of Sensitive Information to an Unauthorized Actor
description The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Exploits
Severity_range_score5.3 - 5.3
Exploitability0.5
Weighted_severity4.8
Risk_score2.4
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-jghn-eujf-zbdn